You are on page 1of 9

Technology Now Your Companion to

SAM Computer Concepts 2nd Edition


Corinne Hoisington Solutions Manual
Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/technology-now-your-companion-to-sam-computer-concepts-2nd-edition-corinn
e-hoisington-solutions-manual/
Technology Now, 2e, Instructor’s Manual Page 1 of 8

Technology Now, 2e
Chapter 7: The Connected
Computer
A Guide to this Instructor’s Manual:
We have designed this Instructor’s Manual to supplement and enhance your teaching experience through
classroom activities and a cohesive chapter summary.

This document is organized chronologically, using the same headings in orange that you see in the textbook.
Under each heading you will find (in order): The Bottom Line which summarizes the main points in the section,
Lecture Notes providing key section highlights, Teacher Tips, Classroom Activities, and Lab Activities. Pay special
attention to teaching tips, and activities geared towards quizzing your students, enhancing their critical thinking
skills, and encouraging experimentation within the software.

In addition to this Instructor’s Manual, our Instructor’s Resources also include PowerPoint Presentations, Test
Banks, and other supplements to aid in your teaching experience.

Table of Contents
In this Chapter 1
7-2: Define a Network 2
7-5: Connect to a Network 2
7-8: Describe How Networks Work 3
7-10: Identify Types of Networks 4
7-15: Define the Internet 4
7-17: Identify the Value of Networks 5
7-19: Identify Network Risks 6
7-23: Secure a Network 6
7-26: End of Chapter Material 7

In This Chapter
• Define a Network
• Connect to a Network
• Describe How Networks Work
• Identify Types of Networks
• Define the Internet
Technology Now, 2e, Instructor’s Manual Page 2 of 8
• Identify the Value of Networks
• Identify Network Risks
• Secure a Network

Define a Network
THE BOTTOM LINE
• Networks can be simple or complex, and network components can interact in different ways.
• Networks can span limited areas the size of your home office or school, or they can be as large as a town or
a country.
• The Internet, a collection of personal, local, regional, national, and international computer networks, is the
largest network in the world.

LECTURE NOTES
• Explain that a network is a system of two or more computers and communications devices linked by wires,
cables, or a telecommunications system. Describe different types of networks.
• Describe how networks make connections and the components used in the process. Refer to Table 7-1.
• Define different network architectures, including peer-to-peer and client/server models.
• Describe home networks and network devices referencing Table 7-2.
• Note key differences between LANs and WANs.
• Introduce the Internet and the infrastructure that makes up the Web, including NSPs, ISPs, and PANs.
• Review differences between wired and wireless networks.

CLASSROOM ACTIVITIES
Class Discussion: How do you view your local area connection?
To view your local network connection on a Windows computer, type network in the Search text box, and then
select Network and Sharing Center to view the basic network information and to set up connections.

Project: Have the students research different ISPs and discuss the different options for individuals and
businesses.

Critical Thinking: Why would you change the preset password on your home router? What is a strong password?
Change the preset password on your home router to a strong password that is long and uses numbers, letters,
and symbols.

LAB ACTIVITIES
How fast is your network? Ask students to guess how fast their local network is, and then instruct them to visit
speedtest.net to test download and upload speeds.
Technology Now, 2e, Instructor’s Manual Page 3 of 8

Connect to a Network
THE BOTTOM LINE
• To communicate, networks must conform to network standards.
• To connect to a network, computers need hardware devices and connection options.

LECTURE NOTES
• Explain that computers need specific network hardware, services, and standards to connect to a LAN or a
WAN.
• Discuss network standards and review the ways computers access a network, the type(s) of hardware used,
data transmission speeds, and the types of cable and wireless technology used.
• Define a network, and explain that computers need hardware devices and connection options. Refer to
Table 7-3 for a list of network standards, including Ethernet, PoE, Powerline, Wi-Fi, Bluetooth, 3G, and 4G.
• Explain the different types of communications hardware including NICs, modems, and routers.
• Discuss the methods that mobile devices use to connect to networks.

CLASSROOM ACTIVITIES
Class Discussion: What are the different types of ISPs in your area?
Poll the class and discuss the different ISPs students use at home. Ask how many and what types of devices
(wired and wireless) are connected to their home network. Discuss differences throughout, and pros & cons.

Critical Thinking: Why would you use a mobile phone instead of a landline? Who doesn’t need a landline, and
why? Who does? Please explain?

LAB ACTIVITIES
What are common network standards, and how are they used? Instruct students to include an example
of each in their response. Students should use the information in the chapter and in Table 7-3 to
answer this question.

Describe How Networks Work


THE BOTTOM LINE
• Networks need hardware to transmit data.
• Networks let you share resources and data to get your work done.

LECTURE NOTES
• Discuss how computers connect and digital devices to share resources (storage devices, printers, servers,
and communications hardware) and data (programs and information).
• Discuss network cables, connectors, ports, and modems, and distinguish between cable modems DSL
modems and wireless modems
Technology Now, 2e, Instructor’s Manual Page 4 of 8
• Define hubs, switches, routers, and nodes, and discuss the network protocols that devices use to
communicate with one another, including TCP/IP, IPv4, and IPv6
• Describe bandwidth factors, including broadband and narrowband

CLASSROOM ACTIVITIES
Quick Quiz
1) Wired network cables, or Ethernet cables, connect through Ethernet ports using ____ connectors. (RJ-45)
2) All computers on the Internet follow____, a network protocol that defines how messages (data) are routed
through a network. (TCP/IP, Transmission Control Protocol/Internet Protocol)
3) The information-carrying capacity of a network is called ____. (bandwidth)
4) ____ uses a dish-shaped antenna on a building to communicate with a tower via radio signals. (Fixed wireless)

Identify Types of Networks


THE BOTTOM LINE
• Network topologies include star, bus, ring, and mesh networks, as well as combination topologies.
• Network architecture includes client/server and peer-to-peer (P2P).
• Networks can connect resources using wired or wireless connections.

LECTURE NOTES
• Discuss the basics of a network and that it can be defined by its topology—or how computers and devices
are physically arranged within it. Describe the four different types of topologies (Table 7-4).
• Distinguish between client/server networks and peer-to-peer (P2P) networks.
• Describe how a network server manages traffic, and discuss the common types of servers and their purposes
(Table 7-5).
• Describe wired and wireless networks, and explain how to connect to Wi-Fi networks and mobile networks.
• Compare intranets, extranets, and VPNs, and discuss their applications.

CLASSROOM ACTIVITIES
Class Discussion: Discuss BitTorrent with the class. Note that digital media producers in the film and television
industry use bittorrent.com to post large video files for their customers. Explain that BitTorrent is used for
distributing music and movies over the Internet. Discuss the pros and cons of using BitTorrent to distribute files.

Project: Students are to play the role of a network administrator. The purpose of this network is to provide
access to software, files, and other resources being shared via the network. What type of network should be
configured, and why?
Technology Now, 2e, Instructor’s Manual Page 5 of 8
LAB ACTIVITIES
Break up into groups of 2-4 students. Instruct each group to list and describe the four network topologies and
draw an arrangement of each network. Student answers should be similar to Table 7-4.

Define the Internet


THE BOTTOM LINE
• People use the Internet every day for tasks such as visiting websites to listen to music, do their banking, and
stay in touch with family and friends.
• Although many people think the web is the same thing as the Internet, in fact, the web is only part of the
Internet.

LECTURE NOTES
• Explain the basics of the Internet, identify the Internet as the largest network in the world, consisting of
millions of computers connected through millions of networks spanning the globe. Discuss network service
providers, Internet service providers, and cloud computing.
• Describe the web, or World Wide Web, and discuss webpages, links, websites, and web browsers.
• Describe net neutrality as the concept that all websites have the same value or priority as other websites.

CLASSROOM ACTIVITIES
Quick Quiz
1) The essential infrastructure of the Internet is called the ____. (the Internet backbone)
2) Backbone links and routers are maintained by ____. (network service providers, NSPs)
3) The World Wide Web is commonly referred to as the ____. (web)
4) Webpages are connected through ____. (links)

Identify the Value of Networks


THE BOTTOM LINE
• Local area networks connect small groups of people.
• Wide area networks connect large groups of people.
• The Internet connects the world.

LECTURE NOTES
• Discuss how networks can be used to share hardware and software within an organization.
• Describe how data can be shared within an organization via network attached storage or via remote storage.
• Define cloud computing as Internet-based delivery of computing services, including data storage and
application software, and describe applications of cloud computing.
• Describe network mediated communication, including email, text communication, and video-based
communication.
Technology Now, 2e, Instructor’s Manual Page 6 of 8

CLASSROOM ACTIVITIES
Project: Instruct students to explore different video chat options available on their smartphone. With
permission, students should download and install a video chat app, such as Snapchat, and use it to chat with a
partner.

LAB ACTIVITIES
Personal online storage has many options available, free and paid. Students should research the different
options and sign up for a personal online storage service they are interested in. Instruct students to write up a
detailed report on why they made their selection, and the features it includes.

Identify Network Risks


THE BOTTOM LINE
• Recovering from a network attack or data theft can take a lot of time and money.
• You need to know about common online security risks so you can safeguard your data, software, and
hardware.

LECTURE NOTES
• Describe online security risks, including risks from malware, identity theft, and data theft.
• Discuss types of unauthorized network use, including the creation of evil twin Wi-Fi networks and war
driving.
• Describe cookies, spyware, and adware, and discuss their consequences.
• Describe theft by computer and discuss phishing scams.
• Distinguish between common forms of malware (Table7-7), and discuss bots, zombies, and botnets.
Describe denial of service attacks and cyberterrorism.
• Define social engineering as an attempt to exploit human weaknesses by building relationships with victims
for the purpose of stealing confidential information, and discuss its ramifications.

CLASSROOM ACTIVITIES
Class Discussion: Lead a discussion with students about their personal experience with online security risks.
Students should talk about their encounters, what happened, and what steps they are taking to reduce security
risks in the future. Include discussion of antivirus and antispyware programs and their role in reducing online
security risks.
Technology Now, 2e, Instructor’s Manual Page 7 of 8

Secure a Network
THE BOTTOM LINE
• Protecting a network involves a combination of common sense and complex technology.
• Network security methods include authentication, biometric devices, encryption, and firewalls.

LECTURE NOTES
• Describe common sense methods to secure data, including the use of strong passwords, permissions, and
encryption.
• Discuss methods of authentication, including usernames and passwords, CAPTCHAs, and biometrics.
• Describe encryption and explain how wireless network keys are used to encrypt data sent over a wireless
network.
• Discuss the importance of using a firewall, as well as the importance of securing your router.

CLASSROOM ACTIVITIES
Class Discussion: Lead a discussion with students about how to secure your network. Discuss creating strong
passwords, setting permissions, and enabling the highest level of encryption.

LAB ACTIVITIES
Firewalls can be physical or virtual. Instruct students to explore their home network and the various firewalls
used on their network. Students should be able to describe any physical firewalls installed and which firewall
programs are installed on their computers. Students should also provide their opinion about whether or not
they feel their network is secure enough.

End of Chapter Material


Chapter Review: Focused questions prompting review of each chapter section.

Test Your Knowledge Now: Multiple choice questions spanning chapter topics.

Try This Now: Activities designed to allow application of chapter content using real-world tools.

Critical Thinking Now: Scenarios written to encourage independent thought and debate on subjects covered in
the chapter.

Ethical Issues Now: Exercise offering opportunity to explore ethical issues related to chapter content.

Team Up Now: Exercise designed to encourage group work exploring a subject covered in the chapter.

Key Terms: Complete list of all key terms covered in the chapter.
Technology Now, 2e, Instructor’s Manual Page 8 of 8
Top of Document

You might also like