Professional Documents
Culture Documents
The amount of bytes defines the size of data travelling to the DSL Connection - This type of access is provided through the
network. Typically, the information be transmitted has several conventional telephone network, but it is different from dial-
bytes, and therefore must be divided into what we call up, since even if the user is logged on and surfing the Internet,
the phone line will be released and may be used anytime for
“packets”.
voice calls.
This is a type of broadband connection, offering speeds faster They are commonly used for connecting networked computers
than dial-up. in businesses.
A cable connection uses the same infrastructure as cable TV
service, where both the TV service and the Internet data pass THE WAN IS NOT FREE:
through the same connection at the same time.
optical fiber
This is also a type of broadband connection. DSL
Other ways to connect to the Internet: cable
3G and 4G
Satellite connection Satellite
Radio connection
Connection via mobile phone (3G, 4G) Satellite Internet
This is used in places where conventional Internet is not
available.
Encryption: A set of rules that put information into
code so that only the sender and the receiver are able to Its area of coverage is global, since the satellites are in space
and have an extended reach.
understand it.
Optical fiber
Morse Code: a binary representation of numbers, letters, An extremely thin fiber optic cable, comparable to the
and graphical signals, which uses short and long sounds, thickness of a hair.
and dots and dashes to communicate messages. It was Unlike twisted pair cable, optical fiber does not conduct
developed in 1835 by the painter and inventor, Samuel electricity, instead transmitting the data through light. Optical
Finley Breese Morse. fiber reaches great distances, even overseas.
3G and 4G
3G technology is very common today with regard to mobile
The Internet is changing the way we deal with things on a phones and Internet. It is an acronym that represents the third
daily basis. We are increasingly dependent on major generation of mobile phone standards and technology,
networks to do things, be it a simple, or a more complex, replacing 2G.
task.
With this technology, voice transmission and data is enhanced,
A good example is the digitization of collections that were offering greater connection speeds, among other features, such
previously only on paper, and therefore access to their as broadcast television signals, voice calls, three-dimensional
content was restricted to a few people. Now, with games, and faster downloading of music and videos, etc.
digitization they can be accessed by anyone, anywhere. 4G technology is represented by technologies that provide
THE LAN IS FREE: Internet connections with very high speeds. Therefore, 4G
mobile networks achieve speeds close to those of cable or
DSL modem connections.
Bluetooth
WiFi 4G allows access to multimedia content, such as HD videos
ethernet cable much faster, as well as video-conferencing and music directly
from the Internet, etc.
WiFi - The term, ”WiFi”, loosely translated, means wireless, DSL
or a connection to transmit information without the use of An always-on service, which does not require you to dial each
wires or cables. time you need to connect to the Internet. It uses existing
WiFi is a wireless technology used to connect devices on a copper phone lines to provide digital communication of high
local network. speed data between end users and telephone companies. Voice
signals and data are transmitted on different frequencies
Bluetooth
through copper telephone wires.
This is the name given to a piece of wireless technology for
wireless communication, which enables the transmission of Cable
data quickly and securely via mobile devices, notebooks, An Internet connection though cable that does not use phone
keyboards, mice and headphones. lines. A cable connection uses coaxial cable lines, originally
developed for transporting television images via cable. A
The range of Bluetooth is only a few meters.
cable modem connects your computer to the ISP, and as a
DSL network, cable offers high speeds and an always
Ethernet cable
available service, which means that even when the connection
Ethernet cables use twisted pairs of copper wires and
is not in use, the Internet connection is still available.
connectors, similar to telephones.
Do not avoid a subject, even when it is unpleasant. In
cases like this, the conversation should be completed
To connect equipment to the Internet securely, install to show that the message was read.
a firewall and pay attention to the event logs it generates.
Where offense is caused, do not retaliate.
Additionally, you must install and maintain a good anti-virus
Avoid abbreviations of words, e.g. “y”, “u”, “2”,
program!
“lt8r”, etc.
Avoid long messages, as this makes for tiring
reading. If a longer message is needed, leave a blank
line between some text phrases, dividing it into
paragraphs. This way, the text will be more organized
and easier to read.
See what’s cool, and what you should therefore always do!
at [@] (@) - This is the symbol that separates the user name Spam - This refers to unsolicited emails, which are
from the domain. usually sent to a large number of people.
Domain - This is the name registered by the company that
Phishing - This is a form of electronic fraud,
offers the email service. For example, gmail.com.
characterized by attempts to acquire personal data of
various kinds, e.g. passwords, financial data, etc. The
Components of mailbox:
consists of a scammer impersonating a person or trusted
Inbox: stores messages that are received
company by sending official electronic communication.
Outbox: stores messages that have not been sent
Sent Emails: stores messages that were sent This occurs in several ways, ma
Draft: stores messages that you have not finished writing
Trash: stores deleted messages Virus - program, usually malicious, that spreads by inserting
copies of itself, and becoming part of other programs and files.
Netiquette is a set of manners that are part of general The virus depends on the execution of the host program or file
so it can become active and continue the infection process.
agreements for full communication in virtual
environments (emails, chatsand forums), which means Check the table for some file extensions that may indicate
etiquette in the virtual network. danger. In these cases, you should not click (run) the files that
are included as an attachment in a message.