Free Essay

Personal Computers and the Internet

In: Computers and Technology

Submitted By kriscynthia
Words 763
Pages 4
Personal Computers on the Internet
The differences between Internet and Network Connections A PC makes a direct connection to a network by way of a network adapter, which might be a network port embedded on the motherboard or a network interface card (NIC). The adapter might also be an external device connecting to the PC using a USB port, SCSI external port, or a serial port. The adapter might provide a port for a network cable or an antenna for a wireless connection. (Andrews, Ph.D, n.d.). Local Area Network (LAN) is an example of a network connection. This covers a local area such as a home, office, or other building or a small group of buildings. The Ethenet is the most popular network architecture used today. The three variations of Ethernet are primarily distinquished from one another by speed. A single computer or local network connects to the Internet by way of an Internet service provider (ISP) using one of the following bandwidth technologies:
• Regular telephone lines. The most common and least expensive way to connect to an ISP, requires an internal or external modem.
• Cable modem. Just as with cable TV, cable modems are always connected. Cable modem is an example of broadband media. Broadband refers to any type of networking medium that carries more than one type of transmission. With a cable modem, the TV signal to your television and the data signals to your PC share the same cable.
• DSL (Digital Subscriber Line) is a group of broadband technologies that covers a wide range of speeds. DSL uses ordinary copper phone lines and a range of frequencies on the copper wire that are not used by voice, making it possible for you to use the computer and the phone at the same time.
• ISDN (Intergrated Services Digital Network) is accessed by a dial-up connection. For home use, an ISDN line is fully digital and consists of two channels, or phone circuits, on a single pair of wires called B channels, and slower channel used for control signals, called a D channel.
• Satellite access. This is offered pretty much everywhere. Technology is being developed to use satellites to offer Internet access on commercial airlines. A satellite dish is mounted on top of your house or office building communicates with a satellite used by an ISP offering the satellite service.
• Wireless access. This refers to several technologies and systems that don’t use cables for communication. Wireless is an important technology for mobile devices and for Internet access in remote locations where other methods are not an option.
Steps to connect a workstation to the Internet
Setting up a DSL connection to the Internet:
1. Connect the P/C to the cable modem or DSL box. Connect the cable modem to the TV jack or the DSL box to the phone line. Plug up the power and turn on the broadband device.
2. Configure the TCP/IP settings for the connection to the ISP.
3. Test the connection by using a browser to surf the Web.
Cable modem installation to the Internet:
1. Select the TV wall jack that will be used to connect your cable modem.
2. Using coaxial cable, connect the cable modem to the TV wall jack. Plug in the power cord to the cable modem.
3. When using a network port on your PC, connect one end of the network cable to the network port on the PC and the other end to the network port on the cable modem.
4. You’re now ready to configure Windows for the connection. Right-click My Network Places and select Properties from the shortcut menu. The Network Connections window opens. Click Create a new connection.
5. The New Connection Wizard opens. Click Next to skip the welcome screen. On the next screen select Connect to the Internet and click Next.
6. On the next screen, select Set up my connection manually and click Next. On the following screen select Connect using a broadband connection that is always on and then click Next and then Finish.
Potential problems and solutions when connecting an operation system to the Internet
Connecting to the Internet you can face problems with hackers, viruses, worms, and potential theft. The most important thing is knowing how to protect your computer. The three most important things you can do to protect your computer are to:
 Keep Windows updates current so that security patches are installed as soon as they are available.
 Use a software or hardware firewall.
 Run Antivirus software and keep it current.

Similar Documents

Premium Essay

It 282 Week 7-Individua-Personal Computers on the Internetl

...7-Individua-Personal Computers on the Internetl Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser https://hwguiders.com/downloads/282-week-7-individua-personal-computers-internetl/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) Personal Computers on the Internet A personal computer can be connected to LAN (Local Area Network) by using a router. This type of network is a private network that links computers at a single location, such as at a home or office building. A computer with the LAN connection is allowed to different network components like files, software and devices like printers and fax machines with in the private area. A computer can be connected to a router using Ethernet cable, or a router can communicate wirelessly using radio waves. The Internet is wider than the LAN, basically it is network of networks, and it connects the different networks (LANs and/or MANs) available worldwide and makes them public. The internet connection is called WAN (Wide Area Network) that connects millions of smaller networks with over a billion computers connected at any given time. The most basic difference between a LAN and the Internet then, is that a LAN is private and localized, while the Internet is public and worldwide. A LAN is connected to a router using Ethernet cable but the internet links millions...

Words: 3252 - Pages: 14

Premium Essay

Whay Both Parents Should Take Equal Resoponsibillty of There Children

...Student Workbook  ICAICT101A Operate a personal computer 1st Edition 2011 Part of a suite of support materials for the ICA11 Information and Communications Technology Training Package v1. Acknowledgement These materials were developed by Innovation and Business Skills Australia in association with the Commonwealth Government through the Department of Education, Employment and Workplace Relations (DEEWR), and the South Australian Department for further Education, Employment, Science and Technology. Copyright Statement © 2011 Commonwealth of Australia The views expressed in the copyright work do not necessarily represent the views of the Commonwealth of Australia. This work is copyright and licensed under the AEShareNet Share and Return Licence (AEShareNet–S Licence). The onus rests with you to ensure compliance with the AEShareNet-S Licence and the following is merely a summary of the scope of the Licence. When you obtain a copy of material that bears the AEShareNet-S Licence mark by legitimate means you obtain an automatic licence to use, copy, adapt and/or redistribute this work. If you develop enhancements of the material, you agree that copyright in any enhancements vest automatically in the original copyright owner. Conditions for the Licence can be found at . Queries regarding the standard AEShareNet-S Licence conditions should be directed to the AEShareNet website at . In addition to the standard AEShareNet-S Licence conditions, the following special conditions...

Words: 16837 - Pages: 68

Premium Essay

Personal Internet Based Email Policy

...APPENDIX Employee Handbook 2013 Personal Internet Based Email Policy Purpose Over the last few years the use of email has become predominant in society and most people have multiple accounds. As technology has advanced it has become easier to access personal email from anywhere, especially through the use of internet based email. These internet based email services offer great ease of access; however, they also make it easier to enable the delivery of malware and virus’s into the company infrastructure and must be used with care and awareness. The Personal Internet Based Email Policy lays out the guidelines adopted by Richman Investments in this regard. These guidelines determine the expectations of personal conduct by Richman Investments personnel while engaging in the use of Personal Internet Based Email from Richman Investments computers and networks. Definition Employees will be held accountable for any malicious software, virus, or spyware downloaded or inserted onto Richman Investments computers or networks from a personal account. Policy Richman Investments employees who choose to access Personal Internet Based Email will be held to high professional standards. Personal Internet Based Email accounts can be a useful tool to help our employees maintain a work life balance, however, if used incorrectly or abused, can be detrimental. If there is any confusion in regards to online behavior, refer to the suggested guidelines below before accessing these accounts...

Words: 567 - Pages: 3

Premium Essay

Business Information Technology

...importance of computer literacy Identify the various types of software Define the term computer and identify its components Describe the categories of computers Explain why a computer is a powerful tool Introduction to Computers Determine how the elements of an information system interact Recognize the purpose of a network Discuss the uses of the Internet and the World Wide Web Identify the various types of computer users Discuss computer applications in society Recognize the difference between installing and running a program 1 2 A World of Computers What Is a Computer? What is computer literacy? How is a computer defined? Electronic device operating under the control of instructions stored in its own memory Knowledge and understanding of computers and their uses The computer Computers are everywhere first, Accepts data such as raw facts, figures, and symbol then, Processes data into information (Data that is organized, meaningful, and useful ) finally, Produces and stores results 3 4 The Components of a Computer What is the information processing cycle? What is an _____ device? input Hardware used to enter data and instructions Input Process Output Storage Communication 5 6 1 The Components of a Computer The Components of a Computer What is an ______ device? output What is the system unit? Hardware that conveys information to a user Box-like case containing electronic components used to process data 7 The Components of a Computer What is the...

Words: 1308 - Pages: 6

Premium Essay

Micro Paper

...Supply and Demand of Personal Computers Today almost all households have a personal computer. The majority of households have multiple personal computers. In all the developed nations across the world, this is the norm. It is common to have one desktop computer and several additional laptops within the household. Twenty years ago, this was definitely not the norm. From 1995 to 2015, the price of a personal computer had decreased significantly due to the advancement of technology. Two of the basic principles of microeconomics are supply and demand. As the supply of a product rises to be greater than the demand, the price of the particular product decreases (Applications of Demand and Supply, 2010). This is a perfect example of the effects of supply and demand on the market for personal computers. Twenty years ago, the personal computer was just beginning to spread to middle-class Americans (Comparing Today's Computers to 1995's, 2012). Before this time, computers were mostly only seen in businesses and wealthy households (Court, 2011). A personal computer that was purchased in 1995, for example, had a very different appearance than a computer purchased today. Not only were they much bulkier and space-consuming, they were slower, less efficient, had less storage space, and less memory (Court, 2011). At this time, the average price for a computer was more than $2000 (Comparing Today's Computers to 1995's, 2012). An invention then took off that would change the not only...

Words: 603 - Pages: 3

Premium Essay

Independent Research

...and managing computer information. Several large companies and organizations have computers that are essentials to information management. For most of the big companies or organizations, having an IT department is essential for their day to day operation. 2. Personal computers (Windows/Macintosh): is based on the microprocessor technology which facilitates chips makers to put a CPU on a chip. Today businesses use personal computers for spreadsheets, word processing, accounting, web publishing and data managements. Privately, people use personal computers for playing games at home and online, doing their taxes and balancing their budgets. Windows is Microsoft, Macintosh is Apple, these two personal computers manufacturers are competitors since the beginning of personal computers. The major differences between these two companies are in their microprocessor computing power and graphic designs. 3. Needs assessment: is a process of assessing how to be more organized and more efficient in order to increase productivity by using a personal computer. A computer can perform tasks to make you more efficient such as performing tasks as in recordkeeping, computing payroll, supplies and demands, financial budgets and promotions. Needs assessment can save you or your company money by cutting down on waste. 4. Operating systems: software that communicates with the internal hardware and commands other programs to run. Every computing device such as personal computers, tablets, smartphones...

Words: 1035 - Pages: 5

Premium Essay

Bh Nbkjsbdfkjbkdjf

...Write an 1,050- to 1,400-word essay on technology and social change, covering the following: Provide an introduction that defines both technology and social change and discusses how they are related. Discuss the impact of the personal computer, cellular phones, and the internet on society. Using the three major sociological perspectives, describe the equilibrium model, the digital divide and cultural lag in relation to these technologies and social change. Include how technology has influenced social epidemiology, health and the environment. Explore a recent or emerging form of technology and discuss its potential benefits or consequences for society. Provide a conclusion that summarizes key points. Cite at least three academic, peer-reviewed sources and two popular magazines. Format the paper consistent with APA guidelines. Submit your assignment to the Assignments tab.Write an 1,050- to 1,400-word essay on technology and social change, covering the following: Provide an introduction that defines both technology and social change and discusses how they are related. Discuss the impact of the personal computer, cellular phones, and the internet on society. Using the three major sociological perspectives, describe the equilibrium model, the digital divide and cultural lag in relation to these technologies and social change. Include how technology has influenced social epidemiology, health and the environment. Explore a recent or emerging form of technology and discuss...

Words: 8845 - Pages: 36

Free Essay

Internet Security

...A decade ago, the Internet was something only “techies” talked about. It was a new limitless source of information, with very few users. Today, the Internet has already become an essential part of our lives. It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information. By the end of this decade, over 2 billion people will be connected to the Internet—that’s about half the world’s current population. But with all the good things the Internet offers us, it also opens the door to serious, potentially devastating threats. Unlike corporate and government computer systems, few personal computers have any safeguards beyond basic virus protection. That means anytime you’re online, you are a potential target for online criminals and hackers. And if you have high-speed Internet access, your computer is online most of the time, making Internet criminals and hackers a 24-hour-a-day, year-round threat to you, your personal information, and your family. Understanding how the Internet works and the security threats you face. When you access the Internet, your computer sends a message over the Web that uniquely identifies your computer and where it is located. This allows the information you’ve requested to be returned to you. Often, this requested information carries with it unwanted hidden software created by hackers and online criminals. This software installs itself on your computer and can either be...

Words: 699 - Pages: 3

Free Essay

Webdisgne

...|Security and Confidentiality On the Internet | |You have to create a report on Security and Confidentiality on the Internet. Find 10 appropriate websites on the Internet on this topic and | |list them below. These websites will be used throughout your assignment: | |[1 X 10 = 10 Marks] | | | |1. www.livinginternet.com/tindex_s.htm | |2. www.jmir.org/2002/2/e12/ | |3. www.aib.ie/personal/home/Security-Policy | |4. www.fetac.ie/doc/WelcomeServlet?DocId=0901df9e80001f99 | |5. www.globalmednet.net/privacy.html | |6. technet.microsoft.com/en-us/library/cc780167(v=ws...

Words: 2358 - Pages: 10

Premium Essay

Ict File

...HOW COMPUTER SAVVY ARE YOU? Computer Savvy  knowing what computers can do and what they can’t  knowing how they can benefit you and how they can harm you  knowing when you can solve computer problems and when you have to call for help Other practical payoffs:  Know how to make better buying decisions  Know how to fix ordinary computer problems  Know how to upgrade your equipment & integrate it with new products  Know how to use the internet most effectively  Know how to protect yourself against online villains  Know what kinds of computer uses can advance career INFORMATION TECHNOLOGY Is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. TWO PARTS OF IT COMPUTER – is a programmable, multiuse machine that accepts data–raw facts and figures–and processes, or manipulates, it into information we can use. COMMUNICATIONS – also called telecommunications technology, consists of electromagnetic devices and systems for communication over long distances. Effects of IT to: Education When properly integrated into curriculum and classroom it can: a. Allow students to personalize their education b. Automate many tedious and route tasks c. Reduce teacher’s workload HEALTH Computer Technology is radically changing the tools of medicine. It helps free medical workers for more critical tasks Telemedicine – medical care delivered via telecommunications Robots like da Vinci surgical...

Words: 1941 - Pages: 8

Premium Essay

The History Of Technology In The 1980s

...Ever tried to live without the internet? How about your computer or even your cell phone? Before the 1980s it was not hard to live without them, for this technology had yet to be invented. Our technology keeps improving each year. Since the 1980s, we now have cell phones that are small and can fit inside our pockets; we have computers and the internet that will have an answer, whether false or true, to almost anything. We have smart boards, flat screen TVs, iPads, ear phones, and so much more technology, which we would not have had without the events that happened in the 1980s. January 28, 1986 at about 11:38 A.M. seven people lost their lives on the space shuttle challenger, including McAuliffe, who was the first civilian in space. It took...

Words: 1069 - Pages: 5

Free Essay

Intro to Computers

...Introduction to Computers and the Internet 2 Lesson 1 What Is a Computer? n Personal Computer Hardware n Peripherals n Bits and Bytes n Computer Speed and MHz and GHz n Computer Types Lesson 2 Software n Obtaining Application Software Lesson 3 The Internet n Finding Information on the Web n Evaluating Information on the Web Lesson 4 Understanding E-mail n Sending and Receiving E-mail and Other Forms of Digital Communication n Dangerous E-mail Lesson 5 Types of Computer Crimes n Copyright Laws n Acceptable Use Policies Lesson 6 Computer Workers 3 Introduction to Computers and the Internet 4 WORDS TO KNOW BIOS The basic input-output system is the component that checks your computer’s components and causes the operating system to start. CMOS Complementary Metal Oxide Semiconductor is a chip whose configuration is controlled by a setup program. CPU The Central Processing Unit is a chip, located on the motherboard, which performs mathematical calculations and logic functions. Hardware Refers to all the pieces of physical equipment that make up a computer system. Input Data entered into a computer. Lesson 1 What Is a Computer? n n n n n Computers are a vital part of today’s world. They make controlling and using devices faster, easier, and more accurate. They are in everything from automobiles to washing machines...

Words: 9593 - Pages: 39

Premium Essay

Computer Cthics

...------------------------------------------------- Computer Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: ...

Words: 3631 - Pages: 15

Premium Essay

Final Project

...The average person does not go to work expecting to have big brother looking over their shoulder when they are using their computer. In this day and age the monitoring of computer usage has become more prevalent than it was in the past. As a computer user you have access to more resources on many computers that are just a few mouse clicks away. With your computer at work you can send emails to the four corners of the earth. Today, you can use the World Wide Web to get look at just about anything you can imagine. This includes pictures, sounds, and video. The desktop computer has become a very powerful tool in today’s workplace. There are downsides to this power too. Because of these downsides employers are finding it necessary to monitor what you are doing on your computer. Does this infringe on your privacy right in the workplace? Do you know what your privacy rights in the workplace are? When you are using your computer at the workplace to access you email your activities may be monitored without your knowledge. Companies are not monitoring what computer users are doing with their email. Do you send email to users on the Internet? Most if not all company Internet activity passes through a firewall. One of the functions of a firewall is to monitor Internet traffic coming into and out of the company’s computer network. If you are sending emails to Internet users your company firewall is monitoring whom it is being sent too and if they respond too you. Employers watch company...

Words: 1101 - Pages: 5

Premium Essay

Cyber Crime

...the direct opposite of development. It can contribute to negative impact in term of social and economic development. Cyber crime is a new type of crime that occurs in this Science and Technology years. There are a lot of definitions for cyber crime. According to Wikipidia.com cyber crime also known as computer crime that refers to any crime that involves a computer and a network. Cyber crime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. Besides that cyber crime can be defined as crimes committed on the internet using the computer as either a tool or a targeted victim (Joseph A E, 2006). Computer can be considers as a tool in cyber crime when the individual is the main target of cyber crime. But computer can be considers as target when the crime is directed to the computer. In addition, cyber crime also includes traditional crimes that been conducted with the access of Internet. For example hate crimes, telemarketing Internet fraud, identity theft, and credit card account thefts. In simple word, cybercrime can be defined as any violence action that been conducted by using computer or other devices with the access of internet. This action can give harmful effects to other. Report made by authorities showed that our country involved in 2,123 of cyber crime cases during 2008 which is more than 100 per cent increase...

Words: 1433 - Pages: 6