Web Development 2 (WD2)
1.1 The hardware components which enable internet access are:
Routers – A small device which joins multiple networks together, its entire purpose is to send/route data packets between networks and devices on the network.
Routers use wireless and wired technologies to send data packets. Allows multiple computers or other devices join the same network.
Ethernet cables – which is normally an RJ-45 cable that connects to the Ethernet card inside the device, the purpose of it is to communicate with the hub/modem/router.
Wireless card.
A Computer – with a processor, memory (RAM), hard disk, motherboard, graphics card, motherboard, and a monitor, keyboard and mouse.
NIC cards – A Network Interface Card
…show more content…
Repeaters – A repeaters purpose is to transmit and receive signals, the signal that it receives should get regenerated or replicated to send the signal on further. An analogue repeater can only amplify a signal, while a digital repeater can repair a signal to close to its original quality.
The Software components which enable the internet access are:
Operating systems – so that the PC is able to function with internet protocols and the ISP service.
Browsers – so that the PC can reach and display HTTP links
NON-essential internet access software:
FTP software –File Transfer Protocol software is used to exchange files over the internet.
Email software – used for creating, sending, receiving and organizing electronic mail, or email (often a web
…show more content…
The internet simply could not work without protocols. Protocols are essentially FYI’s (pointers) that allow a device to connect to the internet through the same standards as other devices (Other computer systems).
1.3 ISP’s (Internet Service Providers) or IAP’s (Internet Access Providers) provide a line rental that allows connection to the internet through their servers, when you connect you get a unique IP address that allows you to surf and use the internet.
A web hosting service is a service from a company that can host a website on the internet from their servers, people and organizations tend to use web hosting services so that expenses are dropped (quite substantially in some cases), Designing and maintaining a hosting server is a costly ordeal.
A Domain name register is a service that allows an individual or organization to officially register their domain.
Some main official domains are:
.gov - Government agencies .edu - Educational institutions .org - Organizations (nonprofit) .mil - Military .com - commercial business .net - Network
In Ethernet data is send in form of packages, to control
09.12.2015 Mode of contact: Outreach Client presentation: Clean in presentation, clear in speech and stated to be stressed. 1.- Centerlink: As requested by the Julia, the writer translated two letters in which Centerlink informed Julia that she needs to work 8 hours a week and attend a phone call appointment on Thursday 17 to arrange a job plan. Julia was disappointed about it and burst in tears, as she feels that her mental and physical conditions does not allow her to work at all.
Unit 12 Pass 2 When working as a support technician you will need to adhere to certain policies and procedures that the company operates on. Regardless of your particular terms of employment, it is a requirement to follow these policies, as failing to do so may cost you your position within the company. Organisational Guidelines When you join an organisation, you will be presented with a set of guidelines which explain the rules on different important aspects such as reporting faults, security and internet use.
• ICMP; is one of the main rules of the internet protocol suite. It is used by system devices, like router, to send error messages showing, for example, that a demanded service is not offered or that a crowd or router could not be touched. • DHCP; Dynamic host configuration protocol is a customer server rules that repeatedly delivers an internet rules (IP) address and other linked arrangement information such as the subnet mask and avoidance entry. • Bluetooth; Bluetooth is a wireless communication technology that lets people to usefully connect their plans with other policies “and “the character of the technology is developing to not only allow devices to talk with one another, but actually allow the all-in-one communication between devices, native requests and the cloud.” •
A detailed account will be provided and information will be built upon from the previous task. This report will include an analysis of the previous assignment in which political, legal, social and technological factors were discussed and how they affected selected businesses. An in depth explanation about how these factors affect businesses, Carphone Warehouse and Dogs Trust will be given. Carphone Warehouse: A factor which affects Carphone Warehouse is political factors.
They hold information about the addresses of computers attached to the network and can forward data efficiently to the correct location via an appropriate route. They are generally used as gateways where a local area network is connected to a larger network such as the internet. Web browsers are software programs that allow a person to explore the Internet in an easy to use way. Navigating the Internet through a series of hyperlinks you can browse the Internet. Examples of popular browsers are Chrome, Internet Explorer, Firefox, Safari, and Opera.
There is several different types of components that enable the internet and help the web function correctly upon your computer. A few of these things are; Uploading and FTP, Web Servers, network routers, proxy servers, ISPs, Web Hosting Services, and Domains. I will be explaining all of these components in as much detail as possible. Uploading
Unauthorised access is when a person is able to access the website or program, service, server or can access with other system. For example, if a person is trying to access an email which requires a password and has tried many attends on guessing the person or the username for this account that is not their account but then gain access to this account, this is therefore considered as unauthorised access as this is not their email they are accessing into but someone else’s which is then considered as hacking. Unauthorised access can also be when a person is trying to access a website in which they are not allowed of access to. For example, if a person is trying to access a website to watch films which does not allow access to but the person attempts to access that area, this would then would lead to being unauthorised as a message will appear on top of the screen which will not allow them access to he website. This can be another form of hacking.
Planning a head A business plan that worked for you 10 years ago might not be effective today. The market conditions keep changing after some time, so you need to set aside some time to come back to review and update your business plan. As your business expands, your strategy has to change to fulfil the new conditions in the market. For instance, your goal might change from winning new customers to building a sustainable and profitable relationship which will maximize on the growth with the existing shoppers.
Making it fast, fair to users without violating their freedom of expression and privacy. With the rules of the federal communications commission there will be no blocking, no throttling, or no paid prioritization. Allowing all educators, staff, consumers and users to open internet for them to do what they want when they want. No person will ever be over charged. Company’s websites will ever be slowed down if they are not able to pay a fee.
It will be able to directed the traffic and share information on the progress of the devices host on the network. This can also be done alone. If there are any communication errors, then the data packets will be checked by the network internet layer before transmitting the data packets. This has to be clear and not be
Describe different types of business documents that may be produced and the format to be followed for each. There are many different types of business documents that are used daily in business environments, for example; Emails- The fastest way to send documents and information and follow the format of recipient and subject. Spreadsheets- These are used to store information electronically.
The Federal Communications Commission (FCC) has the power to represent interchanges systems like broadband Internet under the 1996 Telecommunications Act. In the 1990s, most Internet access came in via telephone lines and the law regarded the Internet as a "telecom benefit." This implied that the tenets that connected to the Internet were secured under Title II of the Telecommunications Act. Under Title II, the FCC had the power to order Internet organizations to treat all information just as.
This allows the packet data to be sent and received by the right location. So one can assume IP handles the location, in other words IP Addressing The both of these combined is what makes the internet work. They allow communication within the internet handling data and allowing data to get to its right location.
You can get a domain name either from a domain name sellers or you can get from the hosting company. Usually a domain name seller charges an amount for the domain names, if it is a hosting company they might give you the domain name for free with the hosting of