Академический Документы
Профессиональный Документы
Культура Документы
MEMBERS
Hamad Nadeem(062)
Maryam(015)
Isha(017)
Zaigham (002)
Security
NETWORKING
➢ Definition
A network two or more computers that are linked in order to share resources
➢ Uses
Share Data or Files
Topology
Way to connect computers in a network OR Arrangement of computers in a network
Bus Topology
Star Topology
Ring Topology
Mesh Topology
NETWORKING
The World Wide Web (www) was created in 1990 at CERN Switzerland, at the European Laboratory
for Particles Physics by a young scientist Tim Berners Lee. The world wide web is now managed by a
committee which is known as the World Wide Web Consortium (W3C)
Web Browsers
A Web Browser is an application that can read web pages written in Hyper Text Mark-up Language
(HTML). Browsing is using browser software to visit different websites on the World Wide Web.
Examples
➢ https://www.youtube.com/
➢ https://mcom.pgc.edu.pk/
DESCRIPTION
Address Bar
All web browsers have an address bar. This is where we type URL or the address of the website you
want to visit.
When you enter the URL in the browser’s address bar, it causes Homepage of the site to appear.
DESCRIPTION
Web pages are generally sets of text files coded with special
notation called HTML that is interpreted by a web browser
program reading the file.
DIFFERENCE
Internet
Internet is a global system of interconnected computer network
Client-side Activity
The client-side environment used to run scripts is usually a browser. The processing takes place on
the end users computer. The source code is transferred from the web server to the users computer
over the internet and run directly in the browser.
Server-side Activity
The server-side environment that runs a scripting language is a web server. A user's request is fulfilled
by running a script directly on the web server to generate dynamic HTML pages. This HTML is then
sent to the client browser. It is usually used to provide interactive web sites that interface to databases
or other data stores on the server.
ENCRYPTION
SECURITY
Network security is the process of taking physical and software preventative measures to protect
the underlying networking infrastructure from unauthorized access and misuse.
There are numerous ways that a computer system and its contents can be attacked via network
connections. Many of these incorporate the use of malicious software (collectively called malware).
FORMS OF ATTACK
➢ Virus
➢ Worms
➢ Trojan Horse
➢ Spyware
TYPES
virus
A virus is software that infects a computer by inserting itself into programs that already reside in
the machine. Then, when the “host” program is executed, the virus is also executed.
worms
A worm is an autonomous program that transfers itself through a network, taking up residence in
computers and forwarding copies of itself to other computers. A worm degrades the performance
of applications in entire network.
Trojan horse
A Trojan horse is a program that enters a computer system disguised as a desirable program, such
as a game or useful utility package, that is willingly imported by the victim.
spyware
Spyware (sometimes called sniffing software) which is a software that collects information about
activities at the computer. In other case, spyware is used for malicious purpose such as recording
the symbol sequence typed at the keyboard in search of passwords or credit card numbers.
PROTECTION
firewall
A primary prevention technique is to filter traffic passing through a point in the network, usually
with a program called a firewall.
https://blog.udemy.com/lan-wan-man/
http://www.omnisecu.com/basic-networking/lan-and-wan-local-area-network-and-wide-area-network.php
https://www.slideshare.net/mohakvjain/presentation-on-world-wide-web-www
https://www.slideshare.net/SaranshArora9/www-or-world-wide-web
https://www.slideshare.net/wallypitt/technology-35765998
https://www.sqa.org.uk/e-learning/ClientSide01CD/page_18.htm
THE END