Class 9 Computer Science Network Safety Of Computer System Notes

Download Class 9 Computer Science Network Safety Of Computer System Notes in PDF format. All Revision notes for Class 9 Computer Science have been designed as per the latest syllabus and updated chapters given in your textbook for Computer Science in Class 9. Our teachers have designed these concept notes for the benefit of Class 9 students. You should use these chapter wise notes for revision on daily basis. These study notes can also be used for learning each chapter and its important and difficult topics or revision just before your exams to help you get better scores in upcoming examinations, You can also use Printable notes for Class 9 Computer Science for faster revision of difficult topics and get higher rank. After reading these notes also refer to MCQ questions for Class 9 Computer Science given on studiestoday

Revision Notes for Class 9 Computer Science Network Safety Of Computer System

Class 9 Computer Science students should refer to the following concepts and notes for Network Safety Of Computer System in Class 9. These exam notes for Class 9 Computer Science will be very useful for upcoming class tests and examinations and help you to score good marks

Network Safety Of Computer System Notes Class 9 Computer Science

NETWORK SAFETY OF COMPUTER SYSTEM
 
Network Safety and Security
 
Network Safety

Network safety consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.
 
Social Networking Ethics

1. Under no circumstances should a post be threatening, harassing, bullying, pornographic, racist, homophobic, or libellous.
 
2. Practice respectful conversation: No obscenities, personal attacks, name-calling, accusations, defamation, or hate speech.
 
3. Refrain from posting comments, images, or links not directly related to the content of the forum.
 
4. Do not post:
• Intentionally misleading or inaccurate information.
• Contact information or identifying details, such as phone numbers or e-mail addresses.
• Information related to advertising, promotion, job recruiting, and campaigning, lobbying, spam, soliciting, or proselytizing.
 
5. Do not post anything while posing as someone else.
 
6. Do not infringe on the copyright of others.
 
Network Security Tools and Services

Tools
This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as port scanners, packet injectors, network sniffers, and web assessment tools. Network security tools are used to lock down the network for safety.
 
LAN Management
A local area network (LAN) is a computer network that interconnects computers in a limited area such defining characteristics of LANs, in contrast to wide area network (WANs), include their smaller geographic area.Token ring and other technology standards have been used in the past, but Ethernet over twisted pair cabling and Wi- Fi are the two most common technologies currently used to build LANs.as a home, school, computer laboratory, or office building using network media.
 
MAN Management
A Metropolitan Area Network(MAN) is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN. Metropolitan limits are determined by local municipal corporations; the larger the city, the bigger the MAN, the smaller a metro city, smaller the MAN
 
WAN Management
A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunication network that links across metropolitan, regional, or national boundaries) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals.
 
PAN management
A PAN(Personal Area Network) is a network of Communicating devices (Computer, Phone, MP3/MP4 Player, Camera etc.) in the proximity of an individual. It can cover an area of a few meters radius.When you have to transfer songs from one cell phone to another, you set up a PAN of two phones. When files are transferred from a PC to an MP3 player, a PAN is set up between the two. There can also be multiple devices in PAN. A PAN can be set up using guided media (USB cable) or unguided media (Bluetooth, Infrared).
 
VOIP
Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Early providers of voice over IP services offered business models and technical solutions that mirrored the architecture of the legacy telephone network. Second-generation providers, such as Skype have built closed networks for private user bases, offering the benefit of free calls and convenience while potentially charging for access to other communication networks.
 
Cyber Security
Cyber security is information security applied to computers and computer network. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Cyber security also includes protection from unplanned events and natural disasters.
 
Need: Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber-attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. So to secure all crucial and confidential data cyber security is required.Objectives Cyber Security’s main purpose is to secure the data and maintain confidentiality of any information stored in computer. It is use to secures the network, as well as protect and oversee operations being done.
 
Social Networking Practices
 
To practice safely on Social networking sites few things are important to keep in mind, such as:-
 
1. Never open random link or any link sends by unknown person.
 
2. Never trust any messages on your social network website or e-mail.
 
3. Always keep your personal information secure by private settings.
 
4. Try to avoid uploading any private information, picture or video.
 
5. Change use password after an interval.
 
6. Avoid opening your social network website or email id on unknown system.
 
New emerging trends
 
Mobile Computing
Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.
 
Cloud Computing
Cloud computing enables companies to consume compute resources as a utility just like electricity --rather than having to build and maintain computing infrastructures in-house.
Cloud computing promises several attractive benefits for businesses and end users including:
 
• Self-service provisioning: End users can spin up computing resources for almost any type of workload on-demand.
• Elasticity: Companies can scale up as computing needs increase and then scale down again as demands decrease.
• Pay per use: Computing resources are measured at a granular level, allowing users to pay only for the resources and workloads they use.
 
Cloud computing services can be private, public or hybrid.

CBSE Class 9 Computer Science Network Safety Of Computer System Notes

We hope you liked the above notes for topic Network Safety Of Computer System which has been designed as per the latest syllabus for Class 9 Computer Science released by CBSE. Students of Class 9 should download and practice the above notes for Class 9 Computer Science regularly. All revision notes have been designed for Computer Science by referring to the most important topics which the students should learn to get better marks in examinations. Our team of expert teachers have referred to the NCERT book for Class 9 Computer Science to design the Computer Science Class 9 notes. After reading the notes which have been developed as per the latest books also refer to the NCERT solutions for Class 9 Computer Science provided by our teachers. We have also provided a lot of MCQ questions for Class 9 Computer Science in the notes so that you can learn the concepts and also solve questions relating to the topics. We have also provided a lot of Worksheets for Class 9 Computer Science which you can use to further make yourself stronger in Computer Science.

Where can I download latest CBSE Class 9 Computer Science Network Safety Of Computer System notes

You can download notes for Class 9 Computer Science Network Safety Of Computer System for latest academic session from StudiesToday.com

Are the revision notes available for Network Safety Of Computer System Class 9 Computer Science for the latest CBSE academic session

Yes, the notes issued for Class 9 Computer Science Network Safety Of Computer System have been made available here for latest CBSE session

Is there any charge for the Class 9 Computer Science Network Safety Of Computer System notes

There is no charge for the notes for CBSE Class 9 Computer Science Network Safety Of Computer System, you can download everything free of charge

Which is the best online platform to find notes for Network Safety Of Computer System Class 9 Computer Science

www.studiestoday.com is the best website from which you can download latest notes for Network Safety Of Computer System Computer Science Class 9

Where can I find topic-wise notes for Class 9 Computer Science Network Safety Of Computer System

Come to StudiesToday.com to get best quality topic wise notes for Class 9 Computer Science Network Safety Of Computer System