1. Define, briefly describing, the following terms or concepts from Networking basics:
WAN
WAN refers to wide area network. According to Dean (299), WAN is used to connect two or more geographically distant local area networks (LAN). The Internet is large existing WAN today. WAN becomes essential for organizations that have sites located in different areas geographically. This provides a means of exchanging data. An example of an application of WAN is in the clothing industry that sells its products to its clients located in different parts of the world via the internet (Dean 300).
LAN
LAN refers to local area network. According to Basic (3), LAN represents a network of computers that are located close to one another physically. The computers in the LAN contain a communication referred to as a network adapter, which functions as a pathway for electrical signals for the networked computers.
A client/server structure refers to a system that is built based on a client and a server component. The client is a computer that seeks information from the server. The server is a large computer where the information is located (Bass, Clements, and Kazman 38).
ISP
ISP refers to internet service provider. An ISP is a company that offers businesses, organizations, and individuals with a right to use to the Internet (Miller 6).
TCP/IP
TCP/IP is the shortened form of Transmission Control Protocol and the Internet Protocol (Hunt 1). This refers to a complete suite of data communication protocols. This protocol provides communications between all types of operating systems and all types of hardware (Hunt 1).
2. Define or briefly describe the following database terms or concepts:
Field
A field is a column in the datasheet of a database.
Record
A record represents a row in the datasheet of a database.
Table
The table contains raw information called data. Each table in an access database contains information about a single category. The data are structured into rows and columns.
Database
The database represents the entire storage for the data and associated objects. These objects may include reports forms, and code modules.
3. What is a relational database and why is a normalized structure relating tables preferable?
A relational database is a database system where data is stored in related tables. For instance, data in a table containing customers’ names may be related to data in another table containing information such as order. Another example is a table containing employees’ names being related to data in another table containing payroll information. A normalized structure in relating databases is preferable since it makes it easier to maintain the database. Consequently, normalization reduces crucial design and work time.
4. Discuss three types of security threats that exist online and how to protect against them.
Spyware
According to most Internet security specialists, spyware is any program that may add toolbars, redirect Web addresses, or bring pop-up ads. This spyware often records victim’s personal information and monitors the computer habits of the victim (Lake 233). With the spyware, the identity thieves can be able to monitor web users and steal their identities. The spyware normally reprograms the user page on the Internet browser of an unsuspecting victim. Spyware identity thieves target children websites as their platform for attacks. Kids are normally distracted by pop-ups, which encourage them to install software that the parents must have avoided. Other spyware insert programs into computers even when there is contact with the user. This is what is referred to as drive-by download. Spyware is prevented by using reliable anti-spyware software.
Spam
Most spam email offers an idea through which the victim can be able to make quick money fast (Lake 211). The spammers have adopted the use of images to avoid being detected easily. In addition, they send emails containing the normal email header ‘hi’ which makes it difficult to filter out. Spammers usually steal most of the email addresses form the different websites where victims may sign up. To prevent spam, use email filter programs such as McAfee’s SpamKiller as an add-on to the operating system.
Phishing
Phishing as tactic involves the use of email, telephone, or instant messaging to pose as a valid entity like an eBay representative for retrieving s and passwords (Lake 179). A common form of phishing is pharming where the identity thieves provide the victim with a link to a bogus website that is almost identical to the real website. This allows the victim to feel secure when providing protected information. Phishing is prevented by using up to date anti-phishing software.
5. How do think Information Technology will change organization going forward in the next ten years and what should you do to prepare yourself?
Organizations that will adapt to new technologies in the future have a higher chance of increasing their performance, which will guarantee the organization’s success. Consequently, organizations need to orient their activities to incorporate information technology. Additionally, since information technology is costly, organizations need to be prepared financially to incur costs because the use of technologies will bring higher returns that will cater for their cost.
Works cited
Basic, LAN. “What is a LAN?” PC Magazine 24 Dec. 2003.3-8. Print.
Bass, Len, Paul Clements, and Rick Kazman. Software architecture in practice. 2nd ed. Boston:
Addison-Wesley, 2003. Print.
Dean, Tamara. Network+ guide to networks. 5th ed. Boston, Mass: Cengage Course
Technology, 2010. Print.
Hunt, Craig. TCP/IP network administration. 3rd ed. Sebastopol, CA: O'Reilly & Associates,
2002. Print
Lake, Silver. Scams & swindles phishing, spoofing, ID theft, Nigerian advance schemes,
Investment frauds, false sweethearts: how to recognize and avoid financial rip-offs in the Internet age. Los Angeles, CA: Silver Lake Publishing, 2006. Print.
Miller, Deborah J. Careers with Internet service providers. New York: Rosen Pub. Group, 2001.
Print.