You are on page 1of 5

A wide area network that allows transmission of data The router is a device used to connect different computers to

over greater geographical distances. A WAN is slower each other.


than a LAN. An Internet connection is an example of a Home router - It bridges the gap between a home
WAN. network and the Internet, and provides connectivity,
A local computer network that covers a relatively small usually to computers, TVs and mobile devices, such as
area. Most LANs are confined to a single building or tablets and smartphones.
group of buildings. Firewall - An application or piece of equipment, which
Home Network - A small LAN that normally has only is usually between the LAN and the WAN.
one router to connect to the Internet. It checks and filters the data stream, controlling
Business Network - A larger LAN that can have multiple communications passing over the network, either
routers to connect to different networks. allowing or blocking them.
Corporate router - A more sophisticated, and therefore
more expensive, piece of equipment dedicated to
Protocols - In a network, computers communicate
forwarding packets and finding the best path between
through protocols, which are sets of predefined rules networks (networks that are larger than domestic
that describe how things should be, the order in networks), located both within and outside of the
which they should happen, and what to do in case of company.
errors. Switch - A piece of equipment that connects computers
Just as a house has a street number (unique and non- within the same network. In order to reduce costs and
transferable), on the Internet and in networks, popularize the technology, home routers have a switch
module built in. On the other hand, corporate models use
IP (Internet Protocol) is the protocol used to give
equipment dedicated to the function of the switch.
computers an address. A computer has a numerical Website - Also known as a site, this is a set of web
address called “IP address”. pages.
An IP address consists of four numbers separated
by dots, each of which may vary from 0 to 255. Hypertext - An electronic document that contains
For example, 23.37.224.170. hyperlinks. Hypertext is organized to promote non-linear
navigation, where the users create their own reading
Bit - It means binary digit, which is the smallest unit of choices, unlike a book, where it's usually necessary to
information that can be stored or transmitted. The read the first chapter in order to understand chapter 2,
computer communicates through a binary system, which and so on.
will be explained further below.
A bit can only have two values, 0 or 1. Homepage - The homepage of a site.
1 byte = 8 bits
1 kilobyte (KB or Kbyte) = 1024 bytes Hyperlink - A hyperlink is a location in the hypertext,
1 megabyte (MB or Mbytes) = 1024 kilobytes which the user clicks to open another page. Typically,
1 gigabyte (GB or Gbyte) = 1024 megabytes hyperlinks are underlined.
1 terabyte (TB or Tbytes) = 1024 gigabytes
URL - A web address. For
On the Internet, the network breaks an email message,for example, http://www.cisco.com.
example, into parts that are called “packets”. Each of these
packets receives a source IP address and a destination, and it is To access these services, the user establishes a client-server
then sent over the network. type Internet connection, where the user's computer is the
Each of these packages can be compared to a letter that has the
client and the services are installed on servers. That's why you
both the recipient's and the sender’s addresses, and it is sent by
the Post Office, which is responsible for transporting it to its can access the services from anywhere in the world.
destination.
In networks, routers play the role of the Post Office, and are Dial-up connection - also known as dial-up connection. With
responsible for forwarding packets through the network until this type of Internet access, a person uses a modem and a
they reach their destination. standard telephone line.

The amount of bytes defines the size of data travelling to the DSL Connection - This type of access is provided through the
network. Typically, the information be transmitted has several conventional telephone network, but it is different from dial-
bytes, and therefore must be divided into what we call up, since even if the user is logged on and surfing the Internet,
the phone line will be released and may be used anytime for
“packets”.
voice calls.
This is a type of broadband connection, offering speeds faster They are commonly used for connecting networked computers
than dial-up. in businesses.
A cable connection uses the same infrastructure as cable TV
service, where both the TV service and the Internet data pass THE WAN IS NOT FREE:
through the same connection at the same time.
 optical fiber
This is also a type of broadband connection.  DSL
Other ways to connect to the Internet:  cable
 3G and 4G
 Satellite connection  Satellite
 Radio connection
 Connection via mobile phone (3G, 4G) Satellite Internet
This is used in places where conventional Internet is not
available.
Encryption: A set of rules that put information into
code so that only the sender and the receiver are able to Its area of coverage is global, since the satellites are in space
and have an extended reach.
understand it.
Optical fiber
Morse Code: a binary representation of numbers, letters, An extremely thin fiber optic cable, comparable to the
and graphical signals, which uses short and long sounds, thickness of a hair.
and dots and dashes to communicate messages. It was Unlike twisted pair cable, optical fiber does not conduct
developed in 1835 by the painter and inventor, Samuel electricity, instead transmitting the data through light. Optical
Finley Breese Morse. fiber reaches great distances, even overseas.
3G and 4G
3G technology is very common today with regard to mobile
The Internet is changing the way we deal with things on a phones and Internet. It is an acronym that represents the third
daily basis. We are increasingly dependent on major generation of mobile phone standards and technology,
networks to do things, be it a simple, or a more complex, replacing 2G.
task.
With this technology, voice transmission and data is enhanced,
A good example is the digitization of collections that were offering greater connection speeds, among other features, such
previously only on paper, and therefore access to their as broadcast television signals, voice calls, three-dimensional
content was restricted to a few people. Now, with games, and faster downloading of music and videos, etc.
digitization they can be accessed by anyone, anywhere. 4G technology is represented by technologies that provide
THE LAN IS FREE: Internet connections with very high speeds. Therefore, 4G
mobile networks achieve speeds close to those of cable or
DSL modem connections.
 Bluetooth
 WiFi 4G allows access to multimedia content, such as HD videos
 ethernet cable much faster, as well as video-conferencing and music directly
from the Internet, etc.
WiFi - The term, ”WiFi”, loosely translated, means wireless, DSL
or a connection to transmit information without the use of An always-on service, which does not require you to dial each
wires or cables. time you need to connect to the Internet. It uses existing
WiFi is a wireless technology used to connect devices on a copper phone lines to provide digital communication of high
local network. speed data between end users and telephone companies. Voice
signals and data are transmitted on different frequencies
Bluetooth
through copper telephone wires.
This is the name given to a piece of wireless technology for
wireless communication, which enables the transmission of Cable
data quickly and securely via mobile devices, notebooks, An Internet connection though cable that does not use phone
keyboards, mice and headphones. lines. A cable connection uses coaxial cable lines, originally
developed for transporting television images via cable. A
The range of Bluetooth is only a few meters.
cable modem connects your computer to the ISP, and as a
DSL network, cable offers high speeds and an always
Ethernet cable
available service, which means that even when the connection
Ethernet cables use twisted pairs of copper wires and
is not in use, the Internet connection is still available.
connectors, similar to telephones.
 Do not avoid a subject, even when it is unpleasant. In
cases like this, the conversation should be completed
To connect equipment to the Internet securely, install to show that the message was read.
a firewall and pay attention to the event logs it generates.
 Where offense is caused, do not retaliate.
Additionally, you must install and maintain a good anti-virus
 Avoid abbreviations of words, e.g. “y”, “u”, “2”,
program!
“lt8r”, etc.
 Avoid long messages, as this makes for tiring
reading. If a longer message is needed, leave a blank
line between some text phrases, dividing it into
paragraphs. This way, the text will be more organized
and easier to read.

See what’s cool, and what you should therefore always do!

 Sources of papers used as references should be cited.


If you wish to make the full text available, please
indicate the website or the bibliography, in the case
of printed books and chapters.
POP and IMAP: Communication protocols that retrieve  The text should always be clear and consistent.
messages from an email server and pass them to an email  When replying to a message, put the recipient's name
client. at the beginning of the sentence.
 Attention to language rules is essential, so use
SMTP: Communication protocol to send messages from the spellcheck. Reading text without punctuation,
email client to the email server. It is also a communication particularly when it is long, is awkward, and more
protocol between email servers. importantly, the chances of it being misinterpreted
Email-address: are increased.
 Try to express yourself clearly, and try to maintain
User Name - This is the login name chosen by the user when the context of the discussion.
creating an email account. For example, my username is  Give respect in order to be respected, and treat others
Switch. as you wish to be treated.

at [@] (@) - This is the symbol that separates the user name Spam - This refers to unsolicited emails, which are
from the domain. usually sent to a large number of people.
Domain - This is the name registered by the company that
Phishing - This is a form of electronic fraud,
offers the email service. For example, gmail.com.
characterized by attempts to acquire personal data of
various kinds, e.g. passwords, financial data, etc. The
Components of mailbox:
consists of a scammer impersonating a person or trusted
Inbox: stores messages that are received
company by sending official electronic communication.
Outbox: stores messages that have not been sent
Sent Emails: stores messages that were sent This occurs in several ways, ma
Draft: stores messages that you have not finished writing
Trash: stores deleted messages Virus - program, usually malicious, that spreads by inserting
copies of itself, and becoming part of other programs and files.
Netiquette is a set of manners that are part of general The virus depends on the execution of the host program or file
so it can become active and continue the infection process.
agreements for full communication in virtual
environments (emails, chatsand forums), which means Check the table for some file extensions that may indicate
etiquette in the virtual network. danger. In these cases, you should not click (run) the files that
are included as an attachment in a message.

 Avoid writing EXCLUSIVELY WITH CAPITAL Extension File Type


LETTERS, and with exaggerated emphasis. Besides
.exe Executable program
being extremely tiresome to read, it means that the
author is "screaming", which may offend the .com MS-DOS program
recipient.
 Do not resend advertisements, chain letters, or other .bat Batch file
similar messages.
 When asking a question, never be arrogant or rude. .scr Screen saver file
Virtual community is the name given to the virtual spaces YouTube
that bring people together on the Internet through values or Allows users to upload and share video in digital format via a
common interests. Generally, these environments have tools Gmail login and password. YouTube is becoming a new form
such as chat, forums, publication of texts and images. of disseminating information and searching for information on
the Internet. It makes it possible to access different types of
Their goal is to facilitate the exchange of knowledge among content, such as a recipe and how to follow it.
participants and debates on certain issues.
Contacts
Enables the organization of all the contacts you have for
As an example, we can look at Wikipedia, which is a people in your social circle. It works like an old address book
collaborative and multilingual encyclopedia project, whose that is kept near the phone, with phone numbers and addresses.
goal is to provide free, reusable content that everyone can edit If you don't use it anymore, you probably know someone who
and improve. does.
Go and check it out at: www.wikipedia.org. Calendar
Another example of a virtual community is a social network, Space to record appointments, but also with some special
such as LinkedIn or Facebook. features, such as automatic reminders. For example, this tool
can be configured to remind you to take a medication for ten
As for forums, chats, games and blogs, search the Internet, or days.
talk to your friends for topics that interest you to find the best
options for your needs. Drive
A virtual disk, i.e. a space in the cloud where you can store,
IT jobs: edit and create documents that can be accessed from
anywhere.
 Database Management
Google Maps
 Network Administration A free service for searching and viewing maps and satellite
 Information Architecture images of Earth, developed and provided by Google. Visit
 E-Commerce the website www.maps.google.com, type the desired address,
 Data Processing and then click Search.
 Programming
 Software Quality Google Books
 Information Security Google Books makes it possible to search books worldwide. If
 Systems the book is not protected by copyright or if the publisher
grants permission, you can view an excerpt, and in some
 Technical Support
cases, even the entire text. If the book is in the public domain,
you can download a PDF copy. Access the
IT professional: website http://books.google.com, type a subject you are
interested in, and then click Search books.
 Database administrator
 Project manager Hangout
An instant messaging and video conferencing service offered
 System analysis/development
by Google.
 Business analyst on the web
 Systems manager Computer
 Network administrator Computer will not turn on - check the surge protector or no-
 Information architect break, check the power outlets, check the power cord.
 Support analyst
Computer turns on, but no image appears on screen -
check the monitor cable or VGA cable.
Facebook is a social network used to keep people in contact
with one another, and to share photos, links, videos and Computer restarting on its own - check the internal
information. temperature of the enclosure, scan for viruses, spyware among
others, check for dirt on contacts, check the electrical
LinkedIn is a social network aimed at the professional installations.
market, where you can post your resume, information about Computer turns on, but the screen goes black and beeps -
your career, and your work portfolio. check if the video card and other cards are firmly placed in the
slots.
The most popular tools are:
The operating system clock is slow - check the battery and
replace it.
 Webmail
 Virtual drives The computer is slow or crashes - check if the processor is
 Map services heating up, scan for viruses, spyware among others, check if
 Online document editors
the boards are firmly secured, check if the hard drive is too
full, check if the power grid has problems.
The surge protector or no-break does not turn on - check
for power problems, check fuse or internal capacitor.
Webcam
Webcam does not work - check the connection to the
computer, verify the configuration, verify that the installation
program has been properly installed.
Virus
Computer viruses, spyware, etc. - see if an anti-virus
program exists and that it is up to date, check if there is an
anti-spyware program, update it and run it on the machine,
check for other programs to combat threats.
Printer
Printer does not print - check the connections to the
computer, verify configuration, verify that the installation
program was properly installed, check if there is paper in the
input tray, check if the paper is jammed.
The Internet is not working - verify that the modem is
connected, make sure the cables are securely attached,
restart the computer, restart the modem.
Slow Internet - check the browser's configuration, check
your equipment and your Internet connection, scan for
viruses, spyware, etc.
WiFi does not work - check if the WiFi equipment is
connected, restart the computer, restart the router (to
properly restart the router, unplug it from the outlet, wait 30
seconds and plug it again), change the location of the
router.
Web Tools
Flash videos will not run - install or update plug-ins.
The movie in Windows Media Player has no picture or
sound - install a codec (software that encodes and decodes
media files, favoring compression for storage and
decompression for playback. When you use any media file,
you are using a codec without even knowing it).
PDF file will not open - install Adobe Reader. PDF format
means, ”portable document format” , and is commonly used
in the market for compression (size). Virtually all equipment
can read this file type.

LinkedIn is a social network aimed at the


professional market, where you can post your

You might also like