Search Header Logo
G7: Networks and Digital Communication

G7: Networks and Digital Communication

Assessment

Presentation

Computers

6th - 8th Grade

Easy

Created by

Soleha Majeed

Used 24+ times

FREE Resource

131 Slides • 91 Questions

1

Networks and Digital Communication

By Soleha Majeed

2

3.1 Accessing Websites

Lesson Objectives

Students will be able to:

  • Understand what a server is and how it works

  • Explain how websites are accessed using the internet

  • Identify the parts of a URL

  • Understand IP addresses and their purpose

  • Explain the role of DNS (Domain Name Server)

Real-life link: Using the internet to open Google, YouTube, or school websites.

3

Introduction to Networks

  • A network is a group of computers connected together to share resources.

  • Networks can be found in schools, homes, and businesses.

  • Let's explore the basic components that make up a network.

media
media

4

Multiple Choice

What is the main purpose of learning about URLs and IP addresses?

1

To design websites

2

To understand how websites are accessed

3

To repair computers

4

To create games

5

What is a Server?

A server is a powerful computer connected to a network that:

  1. Receives requests from other computers (clients)

  2. Processes the request

  3. Sends back the result or forwards it

media

6

What is a Server?

Example: When you open a website, your computer requests data from a web server.


Real-life example: A waiter (server) takes your order, processes it in the kitchen, and brings food back.

media
media

7

Multiple Choice

What is the main job of a server?

1

Store games

2

Receive and respond to requests

3

Control printers

4

Turn off computers

8

Multiple Choice

The web server, website and internet are all same.

1
True
2
False
3
The web server and website are the same
4
The internet is a type of web server

9

Websites and Servers

  • Websites are collections of data files

  • These files are stored on web servers

  • We access websites using the internet

media

10

Websites and Servers

  • Example: School website stored on a server and accessed by students from home.

Real-life example: Books stored in a library; students borrow them when needed.

11

Multiple Choice

Where are website files stored?

1

On the keyboard

2

On personal computers only

3

On servers

4

In browsers

12

Why Use a Web Server?

Web servers can handle multiple tasks, such as sending and receiving emails, storing web applications, and processing FTP requests. However, the primary use of a web server is to host websites, making them functional and interactive for users worldwide.

13

Web browsers- A web browser is a software application used to find, retrieve, and display information resources (websites, images, videos)

media

14

Let take an example of Library

​🖥️ Web Browser – The Student
A web browser (Chrome, Edge, Firefox) is like a student in a school library.


Library Example: The student goes to the library to look for information.

The student does not store all the books.
The student requests a book from the librarian.

Computer Meaning: The browser requests a website It displays the web pages It does not store the website permanently

15

Let take an example of Library

🌐 Website – The Book

A website is like a book in the school library.

Library Example:

  • A book contains information (text, pictures).

  • Different books have different topics.

  • Students read books but don’t keep them permanently.

Computer Meaning:

  • A website contains web pages

  • Pages include text, images, videos

  • Examples: school website, Google, YouTube

📘 Example:

  • A science book = science website

  • A story book = story website

16

Let take an example of Library

🗄️ Web Server – The Library Building

A web server is like the school library building.

Library Example:

  • The library stores all books

  • Librarian finds and gives the requested book

  • Many students use the same library

Computer Meaning:

  • A web server stores websites

  • It receives requests from browsers

  • Sends the required web page back

🏫 One library = many books
🖥️ One server = many websites

17

Let take an example of Library

media

18

What is a URL?

A URL (Uniform Resource Locator) is the address of a website.

Example: https://www.cambridgeinternational.org/about-us/

Used by browsers to locate web pages.

media

19

media

20

Multiple Choice

What does URL stand for?

1

Uniform Resource Locator

2

United Resource Line

3

User Remote Location

4

Universal Record Link

21

Parts of a URL

A URL has three main parts:

  1. Protocol

  2. Domain name

  3. Path

media

22

Multiple Choice

How many main parts does a URL have?

1

1

2

2

3

3

4

4

23

What is a Protocol? - (Rules)

A network protocol is a set of rules or a common language that allows different devices (like computers, phones, servers) to talk to each other over a network, ensuring they understand the data being sent and received, much like how humans use a shared language to communicate. These rules define how to format, send, and process data, enabling seamless communication despite different hardware or software. 

media

24

Multiple Choice

What is a protocol - networking (in easy words)?

1
A protocol is a software application for browsing the internet.
2
A protocol is a set of rules for communication between computers in a network.

25

Multiple Choice

http://www.google.com is an example of a what?
1
URL
2
IP address
3
Browser
4
Application

26

Part 1: Protocol

  • First part of URL

  • Rules for communication

  • Example: https

HTTPS means secure data transfer.

Real-life example: Speaking the same language to communicate.

media

27

Multiple Choice

Which part of the URL shows the communication rules?

1

Path

2

Domain

3

Protocol

28

Multiple Choice

Google Chrome, Mozilla Firefox and Microsoft Edge are all examples of what?
1
Search engines
2
Websites
3
Web Browsers
4
Text editors

29

Multiple Choice

You need a web browser (Chrome, firefox etc) to type a URL?

1
Yes, you need a web browser to type a URL.
2
No, a URL can be typed without a browser.

30

Part 2: Domain Name

  • Middle part of URL

  • Name of the web server

  • Easy to remember for humans


Real life example: remembering the Contact name instead of the phone number

media

31

Multiple Choice

What is the domain name in this URL? https://www.google.com/search

1

https

3

www

4

/search

32

Part 3: Path

  • Last part of URL

  • Shows exact web page or file you're looking for.

Example: /about-us/

Real-life example: Specific room number in a building.

media

33

Multiple Choice

Which part of the URL shows the file or webpage name?

1

Protocol

2

Domain name

3

Path

4

DNS

34

What is an IP Address?

An IP address (Internet Protocol address):

  • Is a unique number

  • Identifies each device on a network

  • Helps data reach the correct device

Example: 192.168.42.1

Real-life example: Home address helps mail reach the correct house

media

35

Multiple Choice

What does an IP address do?

1

Stores data

2

Identifies devices on a network

3

Protects computers from viruses

4

Opens websites

36

Relationship Between URL and IP Address

  • Every URL has a matching IP address

  • Computers use IP addresses

  • Humans use URLs

Example: URL: www.cambridgeinternational.org IP: 192.149.119.103

Real-life example: Phone contact name and phone number.


A URL (like www.google.com) is a human-friendly web address, while an IP address (like 142.250.186.46) is the actual numerical location of the website's server

37

Relationship Between URL and IP Address

  • URL (Uniform Resource Locator): What you type in the browser (e.g., https://www.example.com/page). It tells your browser what to find and where, including the protocol, domain, and path.

  • IP Address (Internet Protocol Address): A unique numerical label (e.g., 192.0.2.1) that identifies a specific device (server) on the internet, acting as its physical location. 

38

Relationship Between URL and IP Address

  • Example

    • Equivalent IP Address (Example): 198.35.26.96 (Wikipedia's IP, may vary).

media

39

Multiple Choice

Which one is easier for humans to remember?

1

URL

2

IP Address

40

Multiple Choice

What is a domain name?

1

programming language.

2

computer hardware.

3

software application.

4

human-readable address for a website.

41

What is DNS?

  • DNS (Domain Name Server):

    • Special server

    • Matches domain names to IP addresses

    • Stores huge database

media

https://www.youtube.com/shorts/K9YWlljNsNw

42

What is DNS?

  • A DNS (Domain Name Server) is a special server that:

    • Stores a database of domain names

    • Matches each domain name to an IP address

    Example:

media

43

Multiple Choice

What information is stored on a DNS?

1

user passwords and personal data.

2

email account settings and preferences.

3

mappings of domain names to IP addresses

44

Why DNS is Needed?

  • Computers communicate using numbers (IP addresses)

  • Humans prefer easy names (URLs)

  • DNS acts as a translator between the two






Real-life example: Asking for “Ali” instead of dialing his full number.

45

Multiple Choice

Why do we need DNS?

1

to store user passwords securely.

2

To enhance video streaming quality.

3

To resolve domain names to IP addresses and facilitate easier navigation on the internet.

46

How DNS Works – Step 1

Step 1: You type a URL into a web browser.

Example: cambridgeinternational.org

The browser understands this is a domain name, not an IP address.

Real-life example: Writing a name on a paper before finding the number.

47

Multiple Choice

What is typed first when opening a website?

1

IP address

2

Domain name (URL)

48

How DNS Works – Step 2

Step 2:

  • The browser sends the domain name to a DNS

DNS checks its database for a matching IP address.

Real-life example: Asking a phone directory for a contact number.

49

Multiple Choice

Which software sends the request to the DNS?

1

Web server

2

Web browser

50

How DNS Works – Step 3

Step 3:

  • DNS searches its database

  • Finds the matching IP address

  • Sends it back to the browser

Example: 192.149.119.103

Real-life example: Directory giving you the correct phone number.

51

Multiple Choice

What does the DNS send back to the browser?

1

Website data

2

Protocol

3

IP address

52

How DNS Works – Step 4

Step 4:

  • Browser sends a request to the web server

  • Web server sends back the website data

Flow: Browser → DNS → Browser → Web Server → Website

Real-life example: Calling a number and speaking to the person.

53

Multiple Choice

Which computer stores the website data?

1

DNS

2

Web server

54

media

55

Many DNS Servers

  • There are many DNS servers worldwide

  • If one DNS cannot find the domain name:

    • It asks another DNS

    • This continues until found

Real-life example: Asking multiple teachers for information.

56

Multiple Choice

What happens if the first DNS cannot find the domain name?

1

Request goes to another DNS

2

Request stops

3

Website opens anyway

57

When a Website is Not Found

  • If no DNS finds the domain name:

  • Browser shows a 404 error

404 error: Website does not exist or cannot be found.

Real-life example: Wrong phone number message.

58

Multiple Choice

What does a 404 error mean?

1

Website is secure

2

Internet is slow

3

Website not found

59

Why Website Security is Important

  • Protects personal information

  • Prevents data theft

  • Keeps payment details safe

Real-life example: Locking your wallet.

60

Multiple Choice

Why should websites be secure?

1

To load faster

2

to protect user data

3

To increase storage

61

Checking Website Security – Protocol

  • Secure websites use https

  • The s stands for secure

  • Data is encrypted

HTTP vs HTTPS:

  • HTTP: Not secure

  • HTTPS: Secure

Real-life example: Writing in secret code.

media

​https://www.youtube.com/shorts/bJGNl0Sv1kw

​https://www.youtube.com/watch?v=w0QbnxKRD0w

62

Multiple Choice

Which protocol shows a secure website?

1

http

2

ftp

3

https

4

www

63

Encryption Explained Simply

  • Encryption turns data into secret code

  • Only the correct server can read it

  • Uses a special key called a cipher

Real-life example: Lock and key system.

media

64

Multiple Choice

What is encryption?

1

Deleting data

2

Copying data

3

. Scrambling data to keep it safe

4

Sending data faster

65

Padlock Symbol

  • Appears in the address bar

  • Locked padlock = secure site

  • Warning symbol = not secure

Real-life example: Lock on a door.

media
media

66

Multiple Choice

What does a locked padlock symbol mean?

1

Website is slow

2

Website is secure

3

Website is blocked

4

Website is offline

67

Digital Certificates

  • Proof that a website is real and secure

  • Checked automatically by the browser

  • Can be viewed by clicking the padlock

Real-life example: ID card verification.

media

​https://www.youtube.com/watch?v=c61HJnVvzsI

68

Multiple Choice

What is the purpose of a digital certificate?

1

Design websites

2

Store passwords

3

Prove website identity

4

Speed up internet

69

Stay Safe Online

  • Always check https

  • Look for padlock

  • Use trusted websites

  • Never share personal data on insecure sites.

70

Multiple Choice

What should you do before entering personal details?

1

Ignore security

2

Check website security

3

. Refresh page

4

Close browser

71

Practical Activity – Browsers

    • Open a website in two browsers

    • Check protocol, padlock, certificate

    • Compare differences

72

Multiple Choice

Why use different browsers in this activity?

1

To compare security display

2

To change IP address

73

Lesson Summary

  • DNS matches domain names to IP addresses

  • Browser contacts DNS first

  • Secure websites use https

  • Padlock and certificates show security

74

What is a Network?

A network is a group of two or more devices (computers, phones, tablets, printers, etc.) that are connected together so they can share data, resources, and services.

Examples:

  • School computers connected to a printer

  • Internet (the largest network in the world)

  • Wi-Fi at home connecting phones and laptops

media

75

Multiple Choice

Which of the following best defines a computer network?

1

A single computer used for personal work

2

A system where devices are connected to share data and resources

76

Ways to Connect Devices on a Network

Devices can be connected in two main ways:

  1. Wired connection (using cables)

  2. Wireless connection (using radio waves)

Each method has its own advantages and uses.

Real-life example:

  • Wired: Using a landline phone

  • Wireless: Using a mobile phone

77

media
media
media

​Wired Connections (Cable)

78

​Wireless Connections

Radio waves

media

79

Multiple Choice

Question image

This symbol on a device represents

1

Internet

2

Bluetooth

3

WiFi

4

Ethernet

80

Multiple Choice

What are the two main ways to connect devices in a network?

1

Wired and wireless

2

Bluetooth and fiber optic

3

Satellite and coaxial

4

LAN and WAN

81

Wired Network (Ethernet)

A wired network uses Ethernet cables to connect devices.

Common devices used:

  • Ethernet cables

  • Network switch

  • Router

  • Desktop computers

  • Printers

82

Ethernet cables

media

83

Multiple Choice

Which cable is commonly used in a wired network?

1
Coaxial cable
2
Fiber optic cable
3
Ethernet cable
4
USB cable

84

Advantages and Disadvantages of Wired Networks

Advantages:

  • Faster speed

  • More stable connection

  • More secure

Disadvantages:

  • Less flexible

  • Requires cables

  • Harder to move devices

Real-life example: Using a wired microphone vs a wireless one.

85

Multiple Choice

Which is an advantage of a wired network?

1

Easy to move devices

2

Uses radio waves

3

Stable and fast connection

4

No cables needed

86

Network Devices

How will you build up a wired network group?

87

media

88

Switch

  • Connects multiple devices in the same network.

  • Sends data directly to the device that needs it (efficient).

  • Example: Office switch connecting computers & printers.

media
media

89

Hub

  • Old device, similar to a switch.

  • Sends data to all devices in the network (less secure, slower).

  • Example: Early computer labs often used hubs.

media

90

Hub VS Switch (Analogy)

  • Hub = announcing to the whole class

  • Switch = whispering to the right student.

media

91

Multiple Choice

A switch is more efficient than a hub because it:

1

Sends data to all devices

2

Sends data only to the intended device

92

Multiple Choice

Why are hubs less secure than switches?

1

They send data to all devices, not just the target one

2

They store all files

93

media

94

media

​Label the following in your notebooks

95

Multiple Choice

Which connection uses radio waves to transfer data?

1

USB cable

2

Wi-Fi

3

HDMI cable

96

Wireless Network (Wi‑Fi)

A wireless network connects devices using radio waves instead of cables.

Main devices used:

  • Wireless Access Point (WAP)

  • Router (with built-in WAP)

  • Laptops, phones, tablets

media

97

Multiple Choice

What type of waves are used in Wi‑Fi networks?

1
Sound waves
2
Infrared waves
3
Microwaves
4
Radio waves

98

Radio Waves Explained Simply

Radio waves are a type of electromagnetic radiation.

  • Travel through air

  • Move in waves

  • Have wavelength and frequency

Higher frequency = shorter wavelength

Real-life example: Ripples in water when you throw a stone.

media

99

Multiple Choice

What does frequency mean?

1

Distance between waves

2

Number of waves per second

3

Speed of light

4

Power of signal

100

Frequency and GHz

  • Frequency is measured in Hertz (Hz)

  • 1 Hz = 1 wave per second

  • Wi‑Fi uses Gigahertz (GHz)

  • 1 GHz = 1 billion cycles per second

Real-life example: Fast vs slow clapping.

media

101

Multiple Choice

What does GHz stand for?

1
gigawatt
2
gigahertz
3
gigabyte
4
gigaohm

102

Wireless Access Point (WAP)

  • A WAP allows devices to connect wirelessly to a network.

    • Sends and receives radio signals

    • Usually built into a router

    Real-life example: A teacher speaking through a microphone to students.

media

​https://www.youtube.com/watch?v=UyHPCDDd_zQ&t=54s

103

media

104

Wireless Network Diagram (Wi‑Fi)

  • A WAP allows devices to connect wirelessly to a network.

    • Sends and receives radio signals

    • Usually built into a router

    Real-life example: A teacher speaking through a microphone to students.

media

105

Multiple Choice

Which device sends Wi‑Fi signals?

1
Smartphone or tablet
2
Modem or network switch
3
Router or wireless access point
4
Desktop computer or laptop

106

Advantages and Disadvantages of Wireless Networks

  • Advantages:

    • Easy to move devices

    • No cables needed

    • Good for mobile devices

    Disadvantages:

    • Slower than wired

    • Can be affected by distance and walls

    • Less secure

    Real-life example: Using Bluetooth headphones.

107

Multiple Choice

Which is a disadvantage of wireless networks?

1

Easy movement

2

Uses cables

3

Can be affected by walls

4

Needs Ethernet

108

Ethernet vs Wi‑Fi (Comparison)

media

109

Multiple Choice

Which network type offers more mobility?

1

Ethernet

2

Wired

3

LAN only

4

WIFI

110

Choosing a Network for an Office

  • Wired network best for:

    • Desktop computers

    • Printers

    • Servers

    Wireless network best for:

    • Laptops

    • Phones

    • Tablets

    Most offices use BOTH.

111

Multiple Choice

Why do offices often use both wired and wireless networks?

1
Offices prefer only wireless networks for easier setup.
2

to balance stability and flexibility.

112

What Are Radio Waves?

Radio waves are a type of electromagnetic radiation.
They move
up and down, similar to ripples on water when a stone is thrown into a pond.

Radio waves are used to send data without wires in technologies like:

  • Wi-Fi

  • Bluetooth

  • Mobile (cellular) networks

Real-Life Example

When you send a message on WhatsApp using Wi-Fi, the data travels as radio waves through the air.

113

Multiple Choice

Radio waves are mainly used for:

1

Sending data wirelessly

2
Medical imaging
3
Weather forecasting
4

Printing documents

114

Parts of Radio Waves

  • A cycle is one complete wave from the top of one wave to the next.

  • Wavelength is the distance between the tops of two waves.

  • It shows how long the wave is.

media

115

Multiple Choice

What is the distance between two wave peaks called?

1

Frequency

2

Cycle

3

Wavelength

4

Speed

116

Frequency of Radio Waves

  • Frequency means how many cycles happen per second.

    • More cycles per second = higher frequency

    • Fewer cycles per second = lower frequency

    Frequency is measured in Hertz (Hz).

media

117

Frequency of Radio Waves

Real-Life Example

Fast music beats = high frequency
Slow drum beats = low frequency

Note:

  • Linking frequency to speed

media

118

Multiple Choice

Frequency tells us:

1

How many waves occur per second

2

How strong a wave is

3

How far a wave travels

4

How much data is stored

119

Gigahertz (GHz)

  • 1 Hertz (Hz) = 1 cycle per second

  • 1 Gigahertz (GHz) = 1 billion cycles per second

Most wireless networks use GHz frequencies.

Real-Life Example

Wi-Fi routers work at 2.4 GHz or 5 GHz, sending billions of waves every second.

120

Multiple Choice

1 GHz means:

1

1 thousand cycles per second

2

1 million cycles per second

3

1 billion cycles per second

4

1 trillion cycles per second

121

Types of Wireless Technology

  • There are three main types of wireless technology:

    1. Wi-Fi

    2. Bluetooth

    3. Cellular networks

    All of them use radio waves to send data.

    Real-Life Example

    • Wi-Fi: Home internet

    • Bluetooth: Wireless headphones

    • Cellular: Mobile data (4G/5G)

122

Multiple Choice

Which is NOT a wireless technology?

1

Wi-Fi

2

Bluetooth

3

Cellular network

4

Ethernet

123

What Is a Wi-Fi Network?

  • A Wi-Fi network connects devices without cables using radio waves.

    Devices connect to a Wireless Access Point (WAP).

    Real-Life Example

    Your phone connects to home Wi-Fi through the router.

media

124

Multiple Choice

Wi-Fi uses ______ to transmit data.

1

Light waves

2

Sound waves

3

Radio waves

4

Heat waves

125

Open Ended

What is the difference between Wireless Access Point and router?

126

media

127

Multiple Choice

What is the main job of a router?

1

Connect a network to the internet

2

to store data for future use.

3

to display web pages

128

Wireless Network Interface Card (WNIC)

To connect to Wi-Fi, a device must have a WNIC.
It allows the device to:

  • Receive radio waves

  • Send radio waves back to the WAP

Real-Life Example

Laptops and smartphones have built-in WNICs.

media

129

Multiple Choice

Which component allows a device to use Wi-Fi?

1

CPU

2

RAM

3

Hard disk

4

WNIC

130

Wi-Fi Range and Speed

  • Average Wi-Fi range: 50 metres

  • Maximum speed: up to 1300 Mbps

  • Average speed: about 200 Mbps

Real-Life Example

Wi-Fi is stronger near the router and weaker far away.

131

Wi-Fi Range and Speed

  • Check your wifi speed www.fast.com

132

Multiple Choice

Wi-Fi speed is measured in:

1
bytes per second (Bps)
2
terabytes per second (TBps)
3
megabits per second (Mbps) or gigabits per second (Gbps)
4
kilobytes per second (KBps)

133

2.4 GHz vs 5 GHz Wi-Fi

media

​Real-Life Example Use 5 GHz near router, 2.4 GHz in far rooms.

134

Multiple Choice

Which frequency is better through walls?

1

5 GHz

2

2.4 GHz

3

Both

4

Neither

135

What is Bluetooth Wireless Technology?

Bluetooth Wireless Technology is a type of wireless network that allows devices to connect to each other over short distances. It does not require a router or Wireless Access Point (WAP). Devices communicate directly using radio waves.

Bluetooth is commonly used to connect personal devices quickly and easily.

Real-Life Examples

  • Connecting wireless headphones to a mobile phone

  • Using a wireless mouse or keyboard with a computer

  • Sending photos from one phone to another nearby phone

136

Multiple Choice

Bluetooth Wireless Technology is mainly used for:

1

Long-distance internet access

2

Short-distance device connections

3

Website hosting

4

Email communication

137

Devices Connected Using Bluetooth

Bluetooth is useful for connecting small personal devices. These devices communicate directly with each other without needing cables.

Bluetooth connections are usually one-to-one or one-to-few.

Real-Life Examples

  • Phone ↔ Bluetooth speaker

  • Laptop ↔ wireless keyboard

  • Tablet ↔ stylus pen

138

Multiple Choice

Which of the following is best connected using Bluetooth?

1

Desktop computer to printer across a building

2

Smart TV to internet router

3

Mobile phone to wireless earbuds

4

School computers in a lab

139

What is Pairing?

Pairing is the process of connecting two Bluetooth devices for the first time. During pairing, the devices exchange information so they can recognise each other in the future.

Once paired, devices can reconnect automatically.

Real-Life Example

Pairing is like exchanging phone numbers with a friend. Once saved, you do not need to exchange numbers again.

140

Multiple Choice

What is the first-time connection between Bluetooth devices called?

1

Linking

2

Pairing

3

Routing

4

Sharing

141

Steps to Pair Bluetooth Devices

To pair Bluetooth devices:

  1. Turn on Bluetooth on both devices

  2. Devices scan for nearby Bluetooth devices

  3. Select the device you want to connect

  4. Enter a password or code if required

After this, the devices are paired.

142

Multiple Choice

Which step happens first when pairing Bluetooth devices?

1

Enter a password

2

Select the device

3

Turn on Bluetooth

4

Send data

143

Bluetooth Speed and Frequency

Bluetooth Wireless Technology:

  • Transmits data at speeds of up to 25 Mbps

  • Operates at a fixed frequency of 2.45 GHz

  • Uses less power than Wi-Fi

Real-Life Example

Bluetooth uses less battery, which is why it is used in wireless earbuds.

144

Multiple Choice

Bluetooth operates at which frequency?

1
1.8 GHz
2
5.0 GHz
3
900 MHz
4

2.45 GHz

145

Bluetooth Hardware Requirements

To use Bluetooth, a device must have a Bluetooth transmitter built into it. If a device does not have Bluetooth, a Bluetooth adapter can be used.

Adapters usually connect through a USB port.

Real-Life Example

Using a USB Bluetooth adapter on an old desktop computer.

146

Bluetooth Adapter vs Transmitter

Bluetooth Transmitter

  • Purpose: Converts wired audio into a wireless signal to send to headphones or speakers.

  • Use Case: Plugging a 3.5mm jack into an airplane seat, old TV, or gym equipment to use wireless headphones.

  • Direction: One-way (Output only). 

Bluetooth Adapter (USB/Dongle)

  • Purpose: Adds native Bluetooth capability to a device, usually a PC or laptop that lacks it.

  • Use Case: Plugging a USB dongle into a PC to connect Bluetooth mice, keyboards, or headphones.

  • Direction: Two-way (Data transfer and audio). 

147

Multiple Choice

What can be used to add Bluetooth to a device that does not support it?

1

Router

2

Ethernet cable

3

Bluetooth adapter

4

Modem

148

Bluetooth Speed and Frequency

Bluetooth Wireless Technology:

  • Transmits data at speeds of up to 25 Mbps

  • Operates at a fixed frequency of 2.45 GHz

  • Uses less power than Wi-Fi

149

Multiple Choice

Bluetooth operates at which frequency?

1

5 GHz

2

2.45 GHz

3

1 GHz

4

10 GHz

150

Bluetooth Range

Bluetooth is designed for short-range communication.

  • Typical range: 10 metres

If devices move too far apart, the connection may stop.

Real-Life Example

Music stops playing when you walk too far away from your phone while wearing Bluetooth headphones.

151

Multiple Choice

What is the typical range of Bluetooth Wireless Technology?

1

100 metres

2

50 metres

3

10 metres

4

1 kilometre

152

Bluetooth Symbol

There is a global symbol that shows a device can use Bluetooth. This symbol is recognised worldwide.

Real-Life Example

The Bluetooth symbol on phones, laptops, and car dashboards.

media

153

History of Bluetooth

Bluetooth technology began in 1994. It was developed by Jaap Haartsen, a Dutch engineer.

It was originally a code name during development.

Real-Life Example

Bluetooth is older than smartphones but still widely used today.

media

154

Multiple Choice

Who helped develop Bluetooth technology?

1

Jaap Haartsen and Sven Mattisson at Ericsson

2
Bill Gates and Paul Allen at Microsoft
3
Steve Jobs and Tim Cook at Apple
4
Mark Zuckerberg and Sheryl Sandberg at Facebook

155

Why is it Called Bluetooth?

Bluetooth is named after King Harald Bluetooth, who united Denmark and Norway.

The logo comes from two ancient symbols representing his initials.

Real-Life Example

Just like the king united countries, Bluetooth connects devices.

media

156

Multiple Choice

Bluetooth was named after:

1

A computer scientist

2

A radio wave

3

A king

4

A company

157

Why is it Called Bluetooth?

The technology was going to be called "Radio Wire" but the company decided the name "Bluetooth"



Logo was based on two ancient symbols

media

158

Multiple Choice

What were the two ancient symbols that bluetooth logo is based on?

1
The initials 'H' and 'B' in Nordic runes.
2
The letters 'A' and 'C' in Greek alphabet.
3
The symbols 'X' and 'Y' in Egyptian hieroglyphs.
4
The characters 'M' and 'N' in Latin script.

159

What is a Cellular Network?

A cellular network is a type of wireless network that uses radio waves to transmit data over large geographical areas.

Unlike Wi-Fi and Bluetooth:

  • Wi-Fi works only inside homes, schools, or offices

  • Bluetooth works only for very short distances

  • Cellular networks cover cities, towns, and even highways

media

160

Cellular Networks

media

​Cellular networks are divided into hexagonal shapes to divide geographic areas into service zones, allowing for efficient, gap-free coverage and maximum frequency reuse to minimize interference.

161

Cellular Networks

media

Key Reasons for Hexagonal Cell Division:

  • Optimal Coverage: Hexagons provide the best approximation of a circle (the theoretical radiation pattern of an antenna) without leaving gaps or overlapping.

162

Multiple Choice

Which statement is true for Cellular networks?

1
Cellular networks use circular shapes to maximize coverage and minimize costs.
2
Cellular networks are divided into square shapes to simplify the design and enhance capacity.
3
Cellular networks are arranged in triangular shapes to improve data transmission and reduce latency.
4

Cellular networks are divided into hexagonal shapes to cover areas efficiently and reduce signal interference.

163

What is a Cellular Network?

Mobile phones use cellular networks so people can:

  • Make calls

  • Send messages

  • Use mobile internet
    even while
    moving from place to place.

Real-Life Example

When you travel from your home to school and still use mobile data, your phone stays connected because of a cellular network.

164

Multiple Choice

Which feature best describes a cellular network?

1

Works only inside buildings

2

Has very small range

3

Covers large geographical areas

4

Uses cables for data transfer

165

Compare these!

Emphasize range comparison (Bluetooth → Wi-Fi → Cellular)

media
media

​VS

166

Why Is It Called a “Cellular” Network?

The large area covered by a cellular network is divided into smaller regions called cells.

Each cell:

  • Covers a small area

  • Has its own base station

  • Communicates with mobile phones using radio waves

media

167

Why Is It Called a “Cellular” Network?

This structure helps:

  • Reduce congestion (blocking or overcrowding)

  • Maintain strong signal quality

  • Support millions of users

Real-Life Example

A city is divided into different neighborhoods. Each neighborhood has its own mobile tower serving nearby users.

media

168

Multiple Choice

What is a “cell” in a cellular network?

1

A mobile phone

2

A SIM card

3

A small geographical area

4

A satellite

169

What Is a Base Station? (Central communication hub)

A base station is a common term used in telecommunications for a radio receiver with one or more antennae.


While the base station has many other applications, it’s often used for mobile telephony, wireless communications, and even wireless computer networking. 

media

170

What Is a Base Station? (Central communication hub)

A base station is a fixed structure that:

  • Sends and receives radio signals

  • Connects mobile phones to the network

  • Communicates with other base stations

Each cell has one base station, usually located on:

  • Towers

  • Rooftops

  • High buildings

Real-Life Example

Those tall mobile towers you see near roads or buildings are base stations..

media

171

Multiple Choice

What is the main job of a base station?

1
To manage power distribution for mobile devices.
2
To store data for mobile applications.
3
To provide internet access to stationary devices.
4
To facilitate communication between mobile devices and the network.

172

How a Mobile Phone Call Works

When you make a call using your mobile phone:

  1. Your phone sends radio signals to the nearest base station

  2. The base station finds the cell of the receiver

  3. Signals travel from base station to base station

  4. The signal reaches the correct phone

This process happens in seconds.

Real-Life Example

Calling a friend in another city — your voice travels through many base stations before reaching them.

173

Multiple Choice

What happens first when you make a phone call?

1

Signal goes directly to the other phone

2

Signal goes to the nearest base station

3

Signal goes to a satellite

4

Signal is stored on the phone

174

Moving Between Cells (Handover)

When you move:

  • Your phone leaves one cell

  • Enters another cell

  • Automatically connects to a new base station

This process is called handover.

Sometimes, during handover:

  • The call may drop briefly

  • Internet may pause for a second

Real-Life Example

While travelling in a car, your call disconnects for a moment and then reconnects.

175

Multiple Choice

Why might a call drop briefly while travelling?

1

Phone battery is low

2
A call might drop when the phone is in airplane mode unintentionally.
3

Phone is damaged

4

Phone is switching base stations

176

Generations of Cellular Networks

Cellular networks have evolved over time. These versions are called generations.

Main generations:

  • 3G – Older, slower

  • 4G – Faster, supports video streaming

  • 5G – Very fast, low delay

Each new generation improves:

  • Speed

  • Capacity

  • Performance

Real-Life Example

Older phones struggle with video calls, while newer phones stream smoothly.

177

Why Is 5G Better Than 4G?

https://www.youtube.com/watch?v=bGxhPG3H5BQ&t=104s

178

Multiple Choice

What does “G” stand for in 4G and 5G?

1
Group
2

Gigabyte

3
Grade
4
Global

179

Comparing 3G, 4G, and 5G

media

180

Comparing 3G, 4G, and 5G

media
media

181

Why Is 5G Better Than 4G?

5G is better because:

  • Much higher speed

  • Lower latency (less delay)

  • Can connect many devices at once

  • More reliable connections

It supports:

  • Smart cities

  • Self-driving cars

  • Online gaming

  • Remote surgery

Real-Life Example

Smart traffic lights using 5G can change signals instantly to avoid traffic jams.

media

182

Multiple Choice

Which is an advantage of 5G?

1

Slower internet

2

Higher delay

3

Works only indoors

4

Supports many devices

183

3.3: Data Transmission

184

What Is a Cipher?

A cipher is a method used to encrypt (scramble) data so that other people cannot understand it.

When we encrypt data:

  • The original message is called plaintext

  • The scrambled message is called ciphertext

  • The method used to scramble it is called a cipher

185

What Is a Cipher?

Encryption helps protect:

  • Passwords

  • Bank details

  • Personal messages

  • Photos

Real-Life Example

When you send a message on WhatsApp, it is encrypted. If someone intercepts it, they cannot read it because it is scrambled.

186

Multiple Choice

What is the main purpose of a cipher?

1

To delete data

2

To scramble data for security

3

To increase internet speed

4

To store files

187

Creating Your Own Cipher (Example)

Let’s create a simple cipher.

Step 1: Choose Method

We will use letters.

media

188

Creating Your Own Cipher (Example)

Step 2: Rule

Each letter moves forward 2 letters in the alphabet.

A → C
B → D
C → E

media

189

Step 3: Encrypt Message

Message:
HELLO FRIEND

Encrypted:
JGNNQ HTKGPF


Real-Life Understanding

This is similar to the Julius Caesar cipher, where letters were shifted in the alphabet.

190

Multiple Choice

If the rule is “shift 1 forward”, what is CAT?

1

DBU

2

BZS

3

CAU

4

CBT

191

What Is an Error in Data?

An error in data is when information becomes incorrect due to a mistake or accidental change.

Errors can happen when data is:

  • Created

  • Processed

  • Stored

  • Accessed

  • Transmitted

This is called data corruption.


Real-Life Example

If you send money online and the amount changes from $50 to $500 due to a system error — that is data corruption..

192

Multiple Choice

Data corruption means:

1

Data is improved

2

Data is copied

3

Data becomes incorrect

4

Data is encrypted

193

Binary and Computers

Computers only understand binary.

Binary uses only:
0 and 1

Example:
55 in binary = 110111

Each 0 or 1 is called a bit.

All:

  • Text

  • Pictures

  • Videos

  • Music

are stored as binary.

media

194

Binary and Computers

Real-Life Example

When you save a photo, it is actually stored as millions of 0s and 1s.


media

​https://www.youtube.com/watch?v=PPiDK2YA9RE

195

Multiple Choice

Binary uses how many digits?

1
4
2
8
3
3
4
2

196

Example of Transmission Error

Original binary:
110111 (55)

After transmission error:
110011 (51)


Where is the
error?

197

Example of Transmission Error

Original binary:
110111 (55)

After transmission error:
110011 (51)

One bit changed from 1 → 0

That small change altered the number completely.

198

Example of Transmission Error

Real-Life Example

Imagine sending exam marks electronically and one digit changes accidentally.



82/100 → 62/100

199

Multiple Choice

If one bit changes during transmission, what can happen?

1

Nothing changes

2

The data may become incorrect

3

The data becomes faster

4

The data becomes encrypted

200

Data Loss During Transmission

Sometimes data is not changed — it is lost.

Example:
Original: 11011110111
Received: 10111

Missing bits cause wrong value.

This leads to incomplete or corrupted data.


Real-Life Example

A downloaded video stops halfway due to data loss.

201

Multiple Choice

If some bits are missing during transmission, this causes:

1

Faster internet

2

Encryption

3

Perfect data

4

Data loss error

202

Electricity Surges

When data travels through cables, it is sent using electric signals.

An electricity surge is a sudden increase in voltage in the electrical supply.

This surge can:

  • Disrupt data transmission

  • Change bits (0s and 1s)

  • Cause data loss

  • Damage hardware

Because computers use binary (0s and 1s), even a small voltage change can alter the data.

203

Electricity Surges

Real-Life Example

During a thunderstorm, lightning causes a power surge.
Your computer suddenly shuts down while saving a file.
When you reopen it, the file is corrupted.

204

Multiple Choice

What is an electricity surge?

1

A slow decrease in voltage

2

A wireless signal

3

A type of encryption

4

A sudden increase in voltage

205

Multiple Choice

An electricity surge can cause:

1

More storage

2

Data errors

3

Encryption

4

Faster internet

206

Voltage Surge Protectors

A voltage surge protector (or SPD) safeguards sensitive electronics from dangerous, temporary increases in voltage caused by lightning, grid switching, or large appliance startup

media

207

Radio-Wave Interference

Wireless devices (Wi-Fi, Bluetooth, cellular networks) use radio waves.

In crowded areas:

  • Many devices send signals at the same time.

  • Radio waves can mix together.

  • Signals may become unclear or corrupted.

This mixing of radio waves is called interference.

208

Radio-Wave Interference

Interference can:

  • Slow internet speed

  • Cause buffering

  • Corrupt transmitted data


Real-Life Example

You are at a concert with thousands of people.
Everyone is using mobile data.
Your internet becomes very slow because many signals are interfering with each other.

209

Multiple Choice

Interference happens when:

1

Cables break

2

Power goes off

3

Radio waves mix together

4

Data is encrypted

210

Attenuation (Signal Weakening)

Sometimes wireless signals do not get mixed — they simply become weaker.

This is called attenuation.

Attenuation happens when:

  • Signals pass through walls

  • Signals travel long distances

  • Obstacles block the signal

It does not change data, but it weakens the signal strength.


Real-Life Example

Your Wi-Fi works well in the living room but becomes weak in your bedroom because walls block the signa

211

Multiple Choice

Attenuation mainly causes:

1

Data corruption

2

Signal weakening

3

Encryption

4

Identity theft

212

Crosstalk

Crosstalk occurs in wired networks.

When many cables are close together:

  • Electrical signals from one cable can affect another.

  • This creates unwanted interference between cables.

Crosstalk can:

  • Corrupt transmitted data

  • Reduce signal quality

Modern cables are twisted or shielded to reduce crosstalk.

Real-Life Example

In older telephone systems, you could sometimes hear another conversation faintly on your call.

213

Multiple Choice

Crosstalk occurs when:

1

Radio waves mix

2

A hacker steals data

3

A website is insecure

4

Electrical signals interfere between cables

214

Hacking, Identity Theft & Fraud

A hacker is someone who tries to break into systems without permission.

If hackers steal your personal information:

  • It is called identity theft.

If they use your information pretending to be you:

  • It is called identity fraud.


Real-Life Example

A hacker steals your email password.
They use it to reset your bank account password and steal money.

215

Multiple Choice

Using stolen personal information to pretend to be someone is:

1

Crosstalk

2

Identity fraud

3

Attenuation

4

Encryption

216

Protecting Yourself Online

To stay safe online:

✔ Use strong passwords
✔ Do not share
personal information
✔ Check for
HTTPS
✔ Avoid
suspicious links

HTTPS means the website encrypts your data.

Look for:
🔒 Lock symbol
https:// at the beginning


Real-Life Example

Before entering credit card details, check if the website address starts with https.

217

Multiple Choice

The “S” in HTTPS stands for:

1

Safe

2

Secure

3

Server

4

System

218

Why Encryption Is Important

Encryption:

  • Scrambles data

  • Makes stolen data useless

  • Protects privacy

Even if hackers steal encrypted data, they cannot read it without the key.

Example encrypted sentence:
WKLV LV D PHVVDJH


Real-Life Example

Online banking uses encryption to protect money transfers.

219

Multiple Choice

Encryption makes stolen data:

1

Faster

2

Larger

3

Meaningless to hackers

4

Visible

220

Activity 3.5 – Research Task

Research another cause of data errors.

Discuss:

  • What did you find?

  • How can errors be prevented?

221

Activity 3.5 – Research Task

Possible examples:

  • Hardware failure

  • Overheating

  • Malware

  • Network congestion

222

Multiple Choice

Which could also cause data errors?

1

Strong passwords

2

Hardware failure

3

Encryption

4

Encryption

Networks and Digital Communication

By Soleha Majeed

Show answer

Auto Play

Slide 1 / 222

SLIDE