Category: Networking

  • Networking includes data and browser and many more

    Computer networking ang tinutukoy mo. Ano ang partikular na aspeto nito (e.g., TCP/IP, Wi-Fi, network security, router configuration, IP addressing)? Gusto mo bang malitahan ang tungkol sa mga protocol, device, o iba pa?

    Requirements: PHP

  • jarigan internet

    Jaringan internet.

  • internet (Interconeted – network)
  • merupakan Sekumpulan Jaringan internet komputer yg membentuk Jaringan luas dan dapat terhubung keberbagai macam (Culav) internet menyendia kan akses untuk layanan di bidang telekomunikasi, dan Sumber daya untuk jutaan pemakainya yg yg tersebar di Seluruh indonesia Bahkan di Seluruh dunia Sehingga Bisa Saling Berbagi informasi.

    Jaringan internet Berkerja Berdasarkan suatu set Protokol Standar yg digunakan untuk meng- hubungkan Jaringan Komputer ke Jaringan yg Lebih Luas. Protokol ini mengatur Format data yg di izinkan dalam Jaringan, (Error – handing) Penanganan Kesalahan Lalulintas pesan atau data , Standar komunikasi Lainnya

    1. Kegunaan internet

    internet menawarkan keunggulan dengan memanfaatkan media yg dapat memberikan akses yg Luas, komunikasi yg murah, sumber informasi yg Luas dan Jangkauan yg tidak terbatas. berikut ke Kegunaan internet

  • internet sebagai media Komunikasi
  • internet sebagai media komunikasi dan informasi.

    menghubungkan layanan internet

    berikut ini merupakan aplikasi media komunikasi

  • email
  • media sosial (Facebook, ig, Twitter, Youtube)
  • web browser (Chrome, Mozilla, Safari, Opera)
  • Direct message (Whatsapp, tele, Line)
  • Koran on (Kompos, Tribunews betik, cnn)
  • Logo Bluetooth (gambar bentuk simbol bintang berujung lima yang saling bersilangan)

    Logo hotspot (gambar bentuk kerucut bertumpuk tiga dengan tulisan “hospot” di bawahnya – kemungkinan kesalahan penulisan “hotspot”)

    2. Konfigurasi jaringan

  • Konfigurasi Bluetooth
  • Bluetooth adalah Protokol Standar industri yg memungkinkan konektivitas nirkabel untuk berbagai perangkat, Printer, Ponsel, komputer, dan perangkat Lainnya. teknologi Bluea (kemungkinan kesalahan penulisan “Bluetooth”) th (kemungkinan kesalahan penulisan “ini”) memungkinkan PC atau komputer untuk dihubungkan dengan periferal nirkabel tanpa memerlukan kabel, tanpa kac (kemungkinan kesalahan penulisan “tanpa masalah” atau bagian kalimat tidak lengkap)

    3. hospot (kemungkinan kesalahan penulisan “hotspot”)

    hospot hot spot merupakan Sebuah area area yg digunakan orang User (Pengguna) untuk bisa mengakses jaringa internet dengan menggunakan komputer, Laptop, hp, tablet atau perangkat lainnya dengan fitur yg ada wi-fi sehingga dapat mengakses media kabel (WLAN)

    Requirements:

  • What is computer networking

    WWhat is computer networking

    Requirements: Java

  • Computer virus

    Ques: Rewrite components of the Animate CC window with figure.

    Ans:

    The components of the Adobe Animate CC window include the Stage, Timeline, Tools Panel, Properties Panel, and Library Panel.

    Stage

    Timeline

    Tools Panel

    Properties Panel

    Library Panel

    Ques: What is meant by HTML? Explain it.

    Ans:

    HTML (HyperText Markup Language) is the standard markup language used to create and structure content on the World Wide Web. It uses a system of tags to define elements such as headings, paragraphs, images, and links, telling the web browser how to display the page content.

    Ques: What is different about tag and elements? Explain it.

    Ans:

    In HTML, tags define the structure and types of elements. Examples: <p>, <h1>, <div>.

    An element includes the opening tag, the content, and the closing tag, making up the complete structure.

    Ques: Explain attributes.

    Ans:

    Attributes provide additional information about an element and are placed inside the opening tag. They give extra properties or behavior to an element, such as id, class, href, etc.

    Requirements: Assembly Language

  • Network Design

    Project Part 1: Network Design

    Scenario

    The Corporation Techs current network consists of 1 web server (accessible by the public), 2 application

    servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs

    Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft

    Windows. The network is connected through a series of switches, is not physically connected to other

    networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall.

    The senior network architect, whom you work for directly, has verified the companys business goals and

    has determined the features and functions required to meet those goals.

    The senior network architect has asked you to create a network design that includes the following

    components:

    • Current infrastructure elements
    • A logical topology that separates the Accounting and Sales departments
    • Redundant communications
    • Justification for continuing with IPv4 or upgrading to IPv6
    Tasks

    For this part of the project, perform the following tasks:

    1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
    2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
    3. Include a high-level plan that ensures communications are available 24/7.
    4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
    5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You must use Microsoft Visio. You will update this design later in the project.
    6. Create a draft report detailing all information as supportive documentation.
    7. Cite sources, where appropriate.
    Required Resources
    • Internet access
    • Course textbook
    Submission Requirements
    • Format: Microsoft Word (or compatible)
    • Font: Arial, size 12, double-space
    • Citation style: Your schools preferred style guide
    • Length of report: 34 pages excluding Title, TOC, and reference pages.
    Self-Assessment Checklist
    • I determined the best network design to ensure the security of internal access while retaining
    • public website availability.
    • I designed a network configuration with physical and logical topologies, and identified major
    • network elements and their locations within the private and protected network segments.
    • I created a plan that ensures communications are available 24/7.
    • I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
    • I created a basic network diagram that illustrates the current network and enhancements.
    • I created a professional, well-developed report with proper documentation, grammar, spelling,
    • and punctuation.
    • I followe

      Project Part 2: Firewall Selection and Placement

      Scenario

      The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

      Tasks

      For this part of the project, perform the following tasks:1. Research and select firewalls for the Corporation Techs network.a. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.b. Address network, server, and workstation firewalls.2. Describe a plan for creating a DMZ, and explain how it makes the network more secure.3. Research network authentication and create a high-level plan for secure authentication to internal network resources.4. Create a draft report detailing all information as supportive documentation. Include updated network diagram.5. Cite sources, where appropriate

    • Project Part 3: Remote Access and VPNs

      Scenario

      As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

      Tasks

      For this part of the project, perform the following tasks:1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.2. Recommend any other forms of remote access that are relevant and describe how they would be used.3. Create a draft report detailing all information as supportive documentation. Include updated network diagram.4. Cite sources, where appropriate.

    • Final Network Design Report

      Scenario

      You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.TasksFor this part of the project, perform the following tasks:1. Create a final network diagram that includes the basic diagram and all relevant network enhancements.2. Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement. Include a 1- to 2-page executive summary.3. Use simple, clear language that primary stakeholders (non-IT) can understand easily.

      Submission Requirements

      • Format: Microsoft Word (or compatible)
      • Font: Arial, size 12, double-space
      • Citation style: Your schools preferred style guide
      • Length of final report: 1016 pages, including executive summary and updated network diagram. Page count excludes Title, TOC, and reference pages and Appendices.
      • NOTE FROM ME(Aminat):Separate each part as a different file when you are submitting it to me. So that i can be able to turn it in to my instructor in part as well.

    Requirements:

  • Network Design

    Project Part 1: Network Design

    Scenario

    The Corporation Techs current network consists of 1 web server (accessible by the public), 2 application

    servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs

    Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft

    Windows. The network is connected through a series of switches, is not physically connected to other

    networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall.

    The senior network architect, whom you work for directly, has verified the companys business goals and

    has determined the features and functions required to meet those goals.

    The senior network architect has asked you to create a network design that includes the following

    components:

    • Current infrastructure elements
    • A logical topology that separates the Accounting and Sales departments
    • Redundant communications
    • Justification for continuing with IPv4 or upgrading to IPv6
    Tasks

    For this part of the project, perform the following tasks:

    1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
    2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
    3. Include a high-level plan that ensures communications are available 24/7.
    4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
    5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You must use Microsoft Visio. You will update this design later in the project.
    6. Create a draft report detailing all information as supportive documentation.
    7. Cite sources, where appropriate.
    Required Resources
    • Internet access
    • Course textbook
    Submission Requirements
    • Format: Microsoft Word (or compatible)
    • Font: Arial, size 12, double-space
    • Citation style: Your schools preferred style guide
    • Length of report: 34 pages excluding Title, TOC, and reference pages.
    Self-Assessment Checklist
    • I determined the best network design to ensure the security of internal access while retaining
    • public website availability.
    • I designed a network configuration with physical and logical topologies, and identified major
    • network elements and their locations within the private and protected network segments.
    • I created a plan that ensures communications are available 24/7.
    • I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
    • I created a basic network diagram that illustrates the current network and enhancements.
    • I created a professional, well-developed report with proper documentation, grammar, spelling,
    • and punctuation.
    • I followe

      Project Part 2: Firewall Selection and Placement

      Scenario

      The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

      Tasks

      For this part of the project, perform the following tasks:1. Research and select firewalls for the Corporation Techs network.a. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.b. Address network, server, and workstation firewalls.2. Describe a plan for creating a DMZ, and explain how it makes the network more secure.3. Research network authentication and create a high-level plan for secure authentication to internal network resources.4. Create a draft report detailing all information as supportive documentation. Include updated network diagram.5. Cite sources, where appropriate

    • Project Part 3: Remote Access and VPNs

      Scenario

      As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

      Tasks

      For this part of the project, perform the following tasks:1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.2. Recommend any other forms of remote access that are relevant and describe how they would be used.3. Create a draft report detailing all information as supportive documentation. Include updated network diagram.4. Cite sources, where appropriate.

    • Final Network Design Report

      Scenario

      You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.TasksFor this part of the project, perform the following tasks:1. Create a final network diagram that includes the basic diagram and all relevant network enhancements.2. Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement. Include a 1- to 2-page executive summary.3. Use simple, clear language that primary stakeholders (non-IT) can understand easily.

      Submission Requirements

      • Format: Microsoft Word (or compatible)
      • Font: Arial, size 12, double-space
      • Citation style: Your schools preferred style guide
      • Length of final report: 1016 pages, including executive summary and updated network diagram. Page count excludes Title, TOC, and reference pages and Appendices.
      • NOTE FROM ME(Aminat):Separate each part as a different file when you are submitting it to me. So that i can be able to turn it in to my instructor in part as well.

    Requirements:

  • Jaringan Komputer dan Internet

    Requirements:

  • Network,Security,

    1.Introduction to Network Security

    Security refers to the set of policies, technologies, and practices designed to protect computer networks and the data flowing through them from unauthorized access, misuse, modification, or disruption. It ensures that communication between devices remains confidential, reliable, and available.

    In modern digital infrastructure, network security is critical because organizations depend heavily on interconnected systems such as the internet, cloud platforms, and internal enterprise networks..

    2.Core Objectives of Network Security

    Networking security is built around three fundamental principles, commonly known as the CIA Triad..

    A. Confidentialityensures that sensitive information is accessible only to authorized users. Techniques such as encryption, access control, and authentication are used to prevent data leakage.

    b. Integrity ensures that data is accurate and has not been altered intentionally or accidentally during transmission. Hashing algorithms and digital signatures help verify data integrity.

    C. vailability ensures that network services and resources remain accessible to legitimate users whenever required. Protection against Denial of Service (DoS) attacks and system failures is essential to maintain availability.

    3.Type of network security

    1.Physical Network Security

    This involves protecting physical components such as routers, switches, servers, and cables from unauthorized physical access. Examples include biometric access, CCTV surveillance, and secure server rooms.

    2.Technical Network Security

    Technical security focuses on protecting data and systems using technology-based controls. Examples include firewalls, encryption, intrusion detection systems, and antivirus software.

    3.ministrative Network Security

    Administrative security includes policies, procedures, and user training. It defines user roles, access privileges, and security guidelines within an organization.

    4.Network security treats

    a. malware includes viruses, worms, trojans, ransomware, and spyware that can damage systems or steal information

    b.Phishing involves tricking users into revealing sensitive information such as passwords or banking details through fake emails or websites.

    c.Denial of Service (DoS) and Distributed DoS (DDoS)

    These attacks aim to overload a network or server, making services unavailable to legitimate users.

    4.Man-in-the-Middle (MITM) Attack

    In this attack, an attacker secretly intercepts and possibly alters communication between two parties without their knowledge.

    5.Unauthorized Access

    Occurs when attackers gain access to network resources without permission due to weak passwords or misconfigured systems.

    5. Network security device and tool.

    a.Firewall

    A firewall acts as a barrier between trusted internal networks and untrusted external networks. It filters incoming and outgoing traffic based on predefined security rules.

    b.lntrusion Detection System (IDS)

    IDS monitors network traffic to detect suspicious activities and generates alerts when potential threats are identified.

    c.intrusion Prevention System (IPS)

    IPS not only detects threats but also actively blocks malicious traffic in real time.

    Virtual Private Network (VPN)

    VPN creates a secure, encrypted tunnel over public networks, allowing safe remote access to private networks.

    6.Encryption in Network Security

    Encryption converts readable data into an unreadable

    Requirements: Typescript