Network Hardware Activity 1: 1. What Is A Twisted Pair Cable, and Where Do We Usually See Them?

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

NETWORK HARDWARE

Activity 1
Part I

1. What is a twisted pair cable, and where do we usually see them?


 Twisted pair cable is a pair of insulated wires that are twisted together to help reduce
noise from outside sources. Twisting minimize electromagnetic radiation and resist
external interference. It also helps to limit interference with other adjacent twisted
pairs. This type of cable is found in many ethernet network, telephone system, and
security camera system. It is used in the telephone lines to provide voice and data
channels.
2. What are coaxial cables?
 Coaxial cable is a type of copper cable specially built with a metal shield and other
components engine to block signal interference. It is primarily used by cable TV
companies to connect their satellite antenna facilities to customer homes and
businesses. It is a type of cable that has an inner conductor surrounded by an
insulating layer, surrounded by a conductive shielding. Many also have an insulating
outer jacket.
3. What is fiber optics and what is the core components used to this cable?
 Fiber optics is the medium and the technology associated with the transmission of
information as light pulses along a glass or plastic strand or fiber. It is used long-
distance and high-performance data networking.
 Core Components:
a. Core: This is the physical medium that transports optical signals from an attached
light source to a receiving device. The core is a single continuous strand of high-
purity glass or plastic whose diameter is measured in microns (less than the
diameter of a human hair). The larger the core, the more light the cable can carry,
which correlates to a higher data transfer rate.
b. Cladding: This is a thin layer that is extruded over the core and serves as the
boundary that contains the light waves (more on this later), enabling data to travel
through the length of the fiber.
c. Coating: This is a plastic coating over the cladding to reinforce the fiber core,
help absorb shocks, and provide extra protection against excessive cable bends. It
does not have any effect on the optical waveguide properties, though.
d. Strengthening fibers: These components help protect the core against crushing
forces and excessive tension during installation. The materials can range from
Kevlar®, to wire strands, to gel-filled sleeves. Sometimes light-absorbing
(“dark”) glass is added between the fibers, to prevent light that leaks out of one
fiber from entering another. This reduces cross-talk between the fibers.
e. Cable jacket: This is the outer layer, or sheathing, of the cable. Its purpose is to
protect the cable from environmental hazards, such as construction work, fishing
gear, and even sharks, which are often attracted to the electrical fields created by
signal conductors to repeaters.
4. What is the difference between CAT5 UTP cable and CAT6e UTP cable?
 Category 5 (CAT5) UTP cable transmits at 100MHz frequencies, providing a rated
line speed of up to 100Mbit/s and a max cable segment of 100 meters. Most CAT5
cables, designed for early networks, only used two twisted pairs. Older CAT5 cables
continue to make up the bulk of the world’s network infrastructure. On the other
hand, Category 6 Enhanced (CAT6E) UTP cable is an augmented specification
designed to double transmission frequency to 500MHz. By wrapping CAT6E in
grounded foil shielding, full 10-Gigabit Ethernet speeds can be reached without
sacrificing the max cable length of 100 meters.
5. What if either of this (NIC/communication medium) is nowhere to be found in a
computer what would happen? Explain
 Computers will not be connected and they cannot share information with each other
anymore. NIC/communication medium are the one who facilitates and prepare and
control data flow between computer and a network. Without these, computers could
not monitor network if there are anyone else who are sending data along the same line
of cabling.
6. Explain what Integrated Services Digital Network (ISDN) is and how it work.
 Integrated Services Digital Network (ISDN) is a network technology that supports the
digital transfer of simultaneous voice and data traffic along with support for video
and fax over the public switched telephone network with a much faster speed and
higher quality than an analog system can provide. It was designed to move outdated
landline technology to digital.
 ISDN uses two channels for communication which are the Bearer Channel or the B
channel and the Delta Channel of the D Channel. The B channel is used for the data
transmission and the D channel is used for signaling and control, though data can be
transmitted through the D channels as well. ISDN has two access options, the Basic
Rate Interface, also known as the BRI or the Basic Rate Access or BRA and Primary
Rate Interface or Primary Rate Access. Basic Rate Interface is made up of two B
channels with a bandwidth of 64 Kbit/s and a D channel with a bandwidth with 16
Kbit/s.
7. What is bandwidth?
 Bandwidth describes the maximum data transfer rate of a network or Internet
connection. It measures how much data can be sent over a specific connection in a
given amount of time. For example, a gigabit Ethernet connection has a bandwidth of
1,000 Mbps (125 megabytes per second). An Internet connection via cable modem
may provide 25 Mbps of bandwidth. While bandwidth is used to describe network
speeds, it does not measure how fast bits of data move from one location to another. It
also refers to a range of frequencies used to transmit a signal. This type of bandwidth
is measured in hertz and is often referenced in signal processing applications.

Part II. Explain why communication medium depend or are based on the following

1. Distance
 Short distances are required for wireless, compressed video, and coaxial cable
systems and for longer distances are required fiber optics, telephone lines and satellite
transmission.
2. Amount of data transfer
 Small amount of data is best handled through twisted pair copper wire and optical
fiber. On the other hand, larger amount of data is best handled with coaxial cables,
compressed video and through satellite communications.
3. How often the transfer is needed
 For locally wired networks that are used by a very limited number of users, coaxial
cable best work for it. While for high-usage public networks, telephone wires are best
work for it but it overloaded when many users use the system at the same time.
4. Availability
 Availability depends on cost, transmission speed, number of users, weather
conditions and so on.

Activity 2
Part 1

1. How many meters does 1 communication medium specifically your UTP cable
support and why?
 90-100 meters is long enough for 1 communication medium to avoid connection loss.
2. What are servers?
 Servers are computer programs that provide services to other computer programs in
the same computer or in other computers in a network.
3. We discussed about modems during our past lessons. In your own words, how does
it work?
 Modem converts an analog signal to a digital signal for the purpose of granting access
to broadband Internet. It modulates the digital signals to analog for transmission and
demodulates it back and to get the transmitted information. It produces signals that
can be easily transmitted and decode to produce original data.
4. What are the differences between modem, router and switch?
 Modem produces signal that can easily transmitted and decode to produce original
data. Router is used to join networks together and routes traffic between them. Switch
allows connections to multiple devices, manages ports and manage VLAN security
settings.
5. What is the token ring on the Ring Topology?
 Token rings work by having the server pass amarker, or “token”, to the computer that
is next in line to communicate. No computer can send receive data unless it is the
target of the token. Collisions between two workstations that wish to transmit
information at the same time are avoided. The token is passed so rapidly that the LAN
users may never know they had to wait. A token ring structure ca support networks in
which the computers are up to 124 miles apart.

Activity 3
Part 1

1. Give examples of HTML either an image or type case.

2. Glossary of internet terms (Define this terminologies)


a) Address: An Internet address or IP address is a unique computer (host) location on the
Internet (expressed either as a unique string of numbers or as its associated
domain name).
: A file (or home page) address is expressed as the defining directory path to
the file on a particular server. (A Web page address is also called a Uniform
Resource Locator, or URL.)
b) Applet: An applet is a small application designed to run within another application.
While the term "applet" is sometimes used to describe small programs
included with a computer's operating system, it usually refers to Java applets,
or small applications written in the Java programming language.
c) Bandwidth: Bandwidth describes the maximum data transfer rate of a network or
Internet connection. It measures how much data can be sent over a
specific connection in a given amount of time.
d) Browser: A web browser, or simply "browser," is an application used to access and
view websites. Common web browsers include Microsoft Internet Explorer,
Google Chrome, Mozilla Firefox, and Apple Safari. The primary function
of a web browser is to render HTML, the code used to design or "mark up"
webpages.
e) Cache: Cache stores recently used information so that it can be quickly accessed at a
later time. Computers incorporate several different types of caching in order to
run more efficiently, thereby improving performance.
f) CGI: The Common Gateway Interface (CGI) is a set of rules for running scripts and
programs on a Web server. It specifies what information is communicated
between the Web server and clients' Web browsers and how the information is
transmitted.
: The computer graphics world, CGI typically refers to Computer Generated
Imagery. This type of CGI refers to 3D graphics used in film, TV, and other types
of visual media. Most modern action films include at least some CGI for special
effects, while other movies, such as a Pixar animated films, are built completely
from computer generated graphics.
g) Chat: Chat may refer to any kind of communication over the Internet that offers a
real-time transmission of text messages from sender to receiver.
h) Client: In the real world, businesses have clients. In the computer world, servers have
clients. The "client-server" architecture is common in both local and wide area
networks. For example, if an office has a server that stores the company's
database on it, the other computers in the office that can access the database are
"clients" of the server.
i) Cookies: A cookie is a small amount of data generated by a website and saved by
your web
browser. Its purpose is to remember information about you, similar to a
preference file created by a software application.
j) Dial-up connection: Dial-up refers to an Internet connection that is established using a
modem. The modem connects the computer to standard phone
lines, which serve as the data transfer medium. When a user
initiates a dial-up connection, the modem dials a phone number of
an Internet Service Provider (ISP) that is designated to receive
dial-up calls. The ISP then establishes the connection, which
usually takes about ten seconds and is accompanied by several
beeping and buzzing sounds.
k) Direct connection: A direct connection is where one computer is linked to another by
a
single cable. For example, a person could connect a crossover
network cable from one computer to another and transfer data
without having to set up a network.
l) Discussion group: A group of people who exchange messages about topics of
common
interest. Often associated with the newsgroups, discussion groups can
take the form of discussion boards, online forums, and e-mail lists.
Dubbed as "online encounters with your own kind," discussion
groups vary widely in topic and format.
m) Domain: A domain contains a group of computers that can be accessed and
administered
with a common set of rules. For example, a company may require all local
computers to be networked within the same domain so that each computer
can be seen from other computers within the domain or located from a
central server.
n) Domain Name: A domain name is a unique name that identifies a website. For
example, the
domain name of the Tech Terms Computer Dictionary is
"techterms.com." Each website has a domain name that serves as an
address, which is used to access the website.
o) Download: Download refers to the process of receiving data over the Internet. It may
also
refer to either a file that is retrieved from the Internet or the process of
downloading a file.
p) FTP: Stands for "File Transfer Protocol." FTP is a protocol designed for transferring
files over
the Internet.
q) Gateway: A gateway is a hardware device that acts as a "gate" between two networks.
It
may be a router, firewall, server, or other device that enables traffic to flow
in and out of the network.
r) Home Page: A home page is the main web page of a website. The term can also refer
to one
or more pages always shown in a web browser when the application starts
up.
s) IP address: IP address, or simply an "IP," is a unique address that identifies a device
on the
Internet or a local network. It allows a system to be recognized by other
systems connected via the Internet protocol.
t) Link/Mirror site: A link (short for hyperlink) is an HTML object that allows you to
jump to a
new location when you click or tap it. Links are found on almost
every webpage and provide a simple means of navigating between
pages on the web.
u) Mosaic: NCSA Mosaic, or simply Mosaic, is the web browser that popularized the
World Wide Web and the Internet. It was also a client for earlier internet protocols
such as File Transfer Protocol, Network News Transfer Protocol, and Gopher. The
browser was named for its support of multiple internet protocols.
v) Network: A network consists of multiple devices that communicate with one another.
It can be as small as two computers or as large as billions of devices.
w) Online: In general, when a machine is "online," it is turned on and connected to other
devices. For example, when a network printer is online, computers connected to
that network can print from it. Other devices, such as scanners, video cameras,
audio interfaces, and others are said to be online when they are running and
connected to a computer system.
x) Online Service: An online service provider can, for example, be an Internet service
provider, an email provider, a news provider, an entertainment
provider, a search engine, an e-commerce site, an online banking site,
a health site, an official government site, social media, a wiki, or a
Usenet newsgroup.
y) Page: In virtual memory systems, a page is a fixed number of bytes recognized by the
operating system.
: Page may also be Short for Web page
z) Protocol: A protocol is a standard set of rules that allow electronic devices to
communicate
with each other. These rules include what type of data may be transmitted,
what commands are used to send and receive data, and how data transfers
are confirmed.
aa) Router: This is a hardware device that routes data from a local area network (LAN) to
another network connection. A router acts like a coin sorting machine,
allowing only authorized machines to connect to other computer systems.
Most routers also keep log files about the local network activity.
bb) Server: A server is a computer that provides data to other computers. It may serve
data to
systems on a local area network (LAN) or a wide area network (WAN) over
the Internet.
cc) SMTP: Stands for "Simple Mail Transfer Protocol." This is the protocol used for
sending
e-mail over the Internet. Your e-mail client (such as Outlook, Eudora, or Mac
OS X Mail) uses SMTP to send a message to the mail server, and the mail
server uses SMTP to relay that message to the correct receiving mail server. It
is a set of commands that authenticate and direct the transfer of electronic mail.
dd) telnet: This is a program that allows you log in to a Unix computer via a text-based
interface.
If you have an account on a Telnet server, you can access certain resources on
the system such your home directory, your e-mail account, FTP files, etc.
ee) upload: It is sending a file from your computer to another system.
ff) URL: Stands for "Uniform Resource Locator." A URL is the address of a specific
webpage or
file on the Internet.

Activity 4
Part 1

1. Explain how computer device gets request from a specific server


 Internet Service Providers are the ones who provide an access to the internet. In Tier
1 connections this is the place or network where server to server are hard wired
connected to host data in a geographically matter, Tier 2 are the ones connecting
country to country, and Tier 3 Network are the ones who distribute this in a country.
 A server is a software or hardware device that accepts and responds to requests made
over a network. The device that makes the request, and receives a response from the
server, is called a client. On the Internet, the term "server" commonly refers to the
computer system which receives a request for a web document, and sends the
requested information to the client.
2. Explain how desktop computer work when you try opening certain web
page(facebook)

COMPUTER SOFTWARE
Activity 5
Part 1.

1. Give 10 examples of hardware found on your personal computer


a. Keyboard f. CPU
b. Mouse g. RAM
c. Monitor h. System unit
d. Motherboard i. Power supply
e. Speaker j. Video card
2. Give 10 examples of software found on your Windows Operating system
a. Microsoft Office f. Adobe Photoshop
b. Google Chrome g. Notepad
c. Windows Media Player h. Movie Maker
d. McAfee i. Music Maker Jam
e. Internet Explorer j. Paint

Activity 6
Part 1

1. What was the name of first computer designed by Charles Babbage? Analytic
machine
2. What was the first electronics digital programmable computing device? Electronic
Numerical Integrator and Computer
3. EDSAC stands for and function. Electronic Delay Storage Automatic Calculator
(EDSAC) was an early British computer. The EDSAC is a large-scale electronic
calculating machine in which ultrasonic delay units are used for storage of orders and
numbers. It is serial in operation and works in the scale of two. Punched tape is used for
input and a teleprinter for output.
4. EDVAC stands for and its function. Electronic Discrete Variable Automatic Computer.
EDVAC was a binary serial computer with automatic addition, subtraction,
multiplication, programmed division and automatic checking with an ultrasonic serial
memory capacity of 1,000 34-bit words.
5. Which was the first commercial computer? ENIAC
6. UNIVAC stands for and its function. Universal Automatic Computer. was used for
general purpose computing with large amounts of input and output.
7. ENIAC stands for and its function. Electronic Numerical Integrator and Computer. It
was designed primarily to calculate artillery firing tables to be used by the United States
Army's Ballistic Research Laboratory to help US troops during World War II.
8. John Mauchly and J. Presper Eckert are the inventors of what computer? Electronic
Numerical Integrator and Computer (ENIAC)
9. Who invented the punch card? Herman Hollerith
10. In the late 1880’s, Herman Hollerith invented data storage on punched cards that
could then be read by a machine.

Activity 7
Part 1

1. A term in computer terminology is a change in technology a computer is/was being


used/
- Generation
2. The fourth generation was based on the integrated circuits. TRUE or FALSE. Why?
- False. The third generation was based on integrated circuits.
3. The generation based on VLSI microprocessor.
- Fourth generation
4. This generation of computer started with using vacuum tubes s the basic
components.
- First generation
5. Batch processing was mainly used in this generation.
- First generation
6. ____ is an emerging branch in computer science, which interprets means and
method of making computers think like human beings.
- AI
7. What is Alpha testing?
- Alpha Testing is a type of software testing performed to identify bugs before
releasing the product to real users or to the public.
8. What is Beta testing?
- Beta Testing is performed by real users of the software application in a real
environment.
9. What happens when alpha and beta testing are done?
- Software release
10. What is coding?
- Coding refers to creating computer programming code. It is the primary method for
allowing intercommunication between humans and machines.
11. What do we call the physical devices of a computer?
- Hardware
12. Software package is a group of programs that solve multiple problems. True or
False
- False. The software package is a group of programs that solve a specific problem or
perform a specific type of job.
13. _____ refer to renewing or changing components like increasing the main memory,
or hard disk capacities, or adding speakers, or modems etc
- Upgrades
14. What is designed to control the operations of a computer?
- Software A person who designs the program in a software package is called
system programs
15. A person who designs the programs in a software package is called
- Software Designer
16. ____________ is designed to solve a specific problem or to do a specific task.
- Application Software

You might also like