Technology Now, 2nd Edition Chapter 7 The Connected

Technology Now, 2nd Edition Chapter 7 The Connected Computer In this Chapter Define a Network Connect to a Network Describe How Networks Work Identify Types of Networks Define The Internet Identify the Value of Networks Identify Network Risks

Secure a Network 2 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (1 of 10) A network is a system of two or more computers and communications devices linked by wires, cables, or a telecommunications system Networks make connections using both

hardware and software Networks can span areas the size of your home office or school, or they can be as large as a country 3 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (2 of 10) 4

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (3 of 10) Identify Network Hardware and Software 5 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (4 of 10) Identify Network Architecture

Network architecture determines how networked computers interact with one another Peer-to-peer (P2P) network: computer maintains its own files and software; all computers have the same capabilities and responsibilities; share resources and peripherals Client/server network, one central computer, called the server, controls access to network resources. Clients request services from the server 6

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (5 of 10) Identify Local Area Networks Local area network (LAN) connects computers and devices in a limited area Each computer or device on the network is called a node 7 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a

license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (6 of 10) Set Up a Home Network 8 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (7 of 10) Set Up a Home Network

9 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (8 of 10) Identify Personal Area Networks Personal area network (PAN) or a wireless personal area network (WPAN) connects personal digital devices within a range of about 30 feet (9 meters) Bluetooth is a short-range wireless technology Body area network (BAN) consists of small,

lightweight biosensors implanted in the body 10 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (9 of 10) Identify Wide Area Networks Wide area network (WAN) is a network that connects devices in two or more LANs located in a large geographic region Metropolitan area network (MAN) is a public, highspeed network owned and operated by a city or county

Neighborhood area network (NAN) connects devices within a limited geographical area, usually including several buildings 11 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define a Network (10 of 10) 12 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a

license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Connect to a Network (1 of 8) 13 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Connect to a Network (2 of 8) Define Network Standards Network standards specify the way computers access a network, the type(s) of hardware used,

data transmission speeds, and the types of cable and wireless technology used ANSI and IEEE propose, develop, and approve network standards 14 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Connect to a Network (3 of 8) Define Network Standards

15 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Connect to a Network (4 of 8) Define Network Standards Table 7-3: Network standards and how they are used (continued) 16 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Connect to a Network (5 of 8) Use Ethernet Technology Ethernet standard controls how adapter cards, routers, and modems share access to cables and phone lines Dictates how devices transmit data 17 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Connect to a Network (6 of 8)

Identify Communications Hardware Network interface card (NIC) communications hardware to connect to networks 18 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Connect to a Network (7 of 8) Identify Communications Hardware Digital modem sends and receives data and information to and from a digital line Router manages network traffic

19 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Connect to a Network (8 of 8) Use Internet Service Providers ISPs use specialized equipment to connect you, for a fee, to the Internet. These connections are made using satellites, cable, phone, or fiber-optic lines. Define Cellular Standards

4G and 5G networks LTE (Long Term Evolution) and WiMAX are competing 4G standards offered by different cellular providers 20 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Describe How Networks Work (1 of 7) 21

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Describe How Networks Work (2 of 7) Identify Network Cables, Connectors, and Ports Network hardware includes clients, servers, modems, network interface cards, hubs, switches, cables, and routers (RJ-11) ports connect through telephone

22 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Describe How Networks Work (3 of 7) Identify Network Cables, Connectors, and Ports 23 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Describe How Networks Work (4 of 7) Describe Network Modems Modem is a communications device that connects a communications channel to a sending or receiving device Cable modem DSL modem Wireless modem 24

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Describe How Networks Work (5 of 7) Define Hubs, Switches, and Routers Hub or switch is a central point of connection for network cables Node any device connected to a network Routers allow networks to communicate with each other

25 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Describe How Networks Work (6 of 7) Define Network Protocols Protocols are a set of rules for network devices to communicate with each other TCP/IP (Transmission Control Protocol/Internet

Protocol) defines how messages (data) are routed through a network IPv4 (Internet Protocol Version 4) IPv6 (Internet Protocol Version 6) 26 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Describe How Networks Work (7 of 7)

Describe Bandwidth Factors Bandwidth information-carrying capacity Broadband refers to high-capacity channels DSL (digital subscriber line) FTTP (Fiber to the Premises) Fixed wireless Wireless Internet Service Providers (WISPs)

Narrowband refers to slower, less capacity channels 27 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (1 of 12) Topology: how computers and devices are physically arranged

Network architecture determines the logical design of computers, devices, and media within a network client/server and peer-to-peer (P2P) 28 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (2 of 12) Define Network Topologies

Network topology defines the physical layout of, and relationship between, network devices 29 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (3 of 12) 30 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a

license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (4 of 12) Define Network Topologies Tree topology Full mesh topology Partial mesh topology 31

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (5 of 12) Identify Client/Server and Peer Networks Networks can be client/server (also called domain-based) or peer-to-peer (also called client-to-client) Domain controller ( a server ) Clients Peer-to-peer (P2P) networks Internet peer-to-peer (Internet P2P) networking

File sharing BitTorrent 32 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (6 of 12) Identify Types of Network Servers

Network server works to manage network traffic, provides access to software, files, and other resources that are being shared via the network 33 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (7 of 12) Describe Wired and Wireless Networks

Wired networks send signals and data through cables Wireless networks send signals through the airwaves 34 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (8 of 12)

Connect to a Wi-Fi Network Mobile computing connect wirelessly to networks to share data and services Smartphones, laptops, tablets, and other handheld devices Wi-Fi networks, Wi-Fi, short for wireless fidelity, uses the 802.11 wireless protocol 35 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Identify Types of Networks (9 of 12) Connect to a Wi-Fi Network WiMAX and LTE are standards for longer-range wireless network connections Hot zones or hotspots are fixed locations 36 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Identify Types of Networks (10 of 12) Use Wi-Fi Hotspots Wi-Fi hotspots let you connect your Wi-Fi-enabled laptop, tablet, or smartphone to the Internet in a

public space 37 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (11 of 12) Use Mobile Hotspots Tether or connect computer to mobile phone Wireless access point also called personal mobile

hotspot Personal hotspot feature Data encryption scrambles and unscrambles data 38 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Types of Networks (12 of 12) Compare Intranets, Extranets, and VPNs

Intranet is a private corporate network for use by authorized employees Extranet that allows outsiders to access part of its intranet Virtual private network (VPN) is a private, secure path across a public network (usually the Internet) that allows authorized users secure access to the company network 39 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a

license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define the Internet (1 of 6) 40 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define the Internet (2 of 6) Internet the largest network in the world, consisting of millions of computers connected through millions of networks spanning the globe

Internet backbone the essential infrastructure of the Internet Backbone links and routers are maintained by network service providers (NSPs) Internet service provider (ISP) a company that offers Internet access to individuals, businesses, and smaller ISPs Cloud computing store files and access applications over the Internet 41

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define the Internet (3 of 6) Describe Internet Growth World Wide Web is pages of related information Pages linked using clickable text and images Webpage addresses that start with www indicate that they are part of the World Wide Web 42

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define the Internet (4 of 6) Define the Web Web Links Websites Homepage Web browsers 43 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a

license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define the Internet (5 of 6) Define the Web 44 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Define the Internet (6 of 6) Describe Internet2 Internet2 is a not-for-profit project founded in 1996 to develop and test advanced network technologies

Describe Net Neutrality Net neutrality all websites have an equal chance of providing services 45 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify the Value of Networks (1 of 7)

46 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify the Value of Networks (2 of 7) Share Hardware Resources on a Network 47 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Identify the Value of Networks (3 of 7) Share Software Resources on a Network Groupware allows several colleagues to work together on a single document at the same time Store Data on a Network Network attached storage (NAS) connect directly to a network, servers provide a centralized location for storing programs and data on large and small networks

Remote storage as a service by commercial providers 48 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify the Value of Networks (4 of 7) Store Data on a Network Three major online storage providers for personal files:

49 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify the Value of Networks (5 of 7) Share Files Using Cloud Computing Cloud computing is Internet-based delivery of computing services, including data storage and application software Synchronize (sync) devices so data is available

across multiple devices 50 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify the Value of Networks (6 of 7) Share Files Using Cloud Computing 51

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify the Value of Networks (7 of 7) Communicate on a Network Email Text communication One-to-one instant messaging Chat Text messaging

Video chat Webcasts 52 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Network Risks (1 of 10) Online security risks

are actions that can damage or misuse your computer and data when you are connected to a network 53 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Identify Network Risks (2 of 10) Describe Unauthorized Network Use Evil twin is a normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it War drivers are people who drive around and connect to wireless networks to gain free Internet access

54 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Network Risks (3 of 10) Identify Privacy Risks on a Network Personal information Monitoring software Video cameras

55 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Network Risks (4 of 10) Define Cookies, Spyware, and Adware Cookies are ordinary text files that contain personal data Spyware is a form of malware secretly installed on networked computers

Adware displays unwanted advertisements in banners or windows on your computer 56 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Network Risks (5 of 10) Describe Theft by Computer Theft by computer is to steal using networked co

Phishing scams use email to try to trick you into revealing personal information on false pretense 57 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Network Risks (6 of 10) 58 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Identify Network Risks (7 of 10) Define Malware Malware is software written with malicious intent that installs itself without permission 59 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Identify Network Risks (8 of 10) Define Bots and Zombies Zombies are computers controlled by outsiders without the owners knowledge Botnet a group of zombies 60 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Identify Network Risks (9 of 10) Describe Denial of Service Attacks Denial of service (DoS) attack is a bombardment of network traffic or messages designed to overload a server Distributed denial of service attack an attacker uses multiple computers to launch such an attack Cyberterrorism the intentional attacks that disrupt computers, networks, and public and financial services on a large scale

61 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identify Network Risks (10 of 10) Describe Social Engineering Social engineering attackers attempt to exploit human weaknesses by building relationships with

victims for the purpose of stealing confidential information 62 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Secure a Network (1 of 7) 63 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a

license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Secure a Network (2 of 7) Use Common Sense to Secure Data Create strong passwords Set permissions Safeguard usernames and passwords Enable the highest level of encryption Dont reveal private information Manage and monitor privacy settings

Be thoughtful when sending email and text messages 64 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Secure a Network (3 of 7) Define Authentication Methods 65

2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Secure a Network (4 of 7) Define Authentication Methods Biometric devices authenticate identity by scanning a persons physical characteristics, such as

fingerprints, face, eyes, handprint, voice, or even signature 66 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Secure a Network (5 of 7) Encrypt Network Data

Wireless network key (also called a network security key) to scramble and unscramble the data being transmitted between wireless devices 67 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Secure a Network (6 of 7) Use a Firewall on a Network

Firewalls are designed to block intruders from accessing corporate or personal networks and are often built into operating systems 68 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Secure a Network (7 of 7) Secure a Wireless Router

Service Set Identifier or SSID the factory-supplied name WPA (Wi-Fi Protected Access) or WPA2 encryption 69 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Recently Viewed Presentations

  • SD62 Careers

    SD62 Careers

    SD62 Careers . Tanya Larkin. SD 62 . Career Coordinator "Know that you can start late, look different, be uncertain, and still succeed." - Misty Copeland ... - Moodle platform, focus block for explorations and face to face time once...
  • Lipids - QUMS

    Lipids - QUMS

    Classification . Simple lipids . Esters of fatty acids with various alcohols . Complex . lipids . groups in addition to an alcohol and a fatty acid . Phospholipids
  • mentor.ieee.org

    mentor.ieee.org

    11k Cairns Agendas Date: 2005-05-13 Authors: Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contr
  • Homeroom/ Study Hall

    Homeroom/ Study Hall

    "Be it resolved, that when in conflict, the right to a fair trial ought to take precedence over freedom of speech." ... Eye contact, poise/posture, voice projection/articulation, confidence, and attire are vital, as well!
  • PowerPoint Presentation

    PowerPoint Presentation

    Watershed and ecosystem management approach; Use suitability and use conflict analysis support the interdisciplinary and holistic aspects of coastal planning and sustainable development; indicating where better information is needed; Objectives and goals of the responsible coastal planning and ...
  • Diffraction Links - EIU

    Diffraction Links - EIU

    Times New Roman Arial Calibri Comic Sans MS Symbol Default Design Bitmap Image MathType 5.0 Equation Wave Nature of Light Diffraction Diffraction Diffraction Applet Breakwater Diffraction Small Island Diffraction Huygens' Principle Ripple Tank Waves Ripple Tank Waves Ripple Tank Waves...
  • Answer Key Review p. 19-20

    Answer Key Review p. 19-20

    Describe the function of the following pieces of equipment: Erlenmeyer flask - containing liquids (not measuring volume) Funnel - preventing spills when pouring ... B. Scoopula (for getting solid chemicals out of a bottle or container. 20. Write the proper...
  • PowerPoint Presentation

    PowerPoint Presentation

    vle.mathswatch.co.uk. Exam Questions. ... Why go anywhere else! Aim High. Work Hard. Be Kind. GCSE Mathematics. Mathsapp.pixl.org.uk. Download the App "Highly effective leadership has secured rapid improvements in pupils' progress and attendance." ... PowerPoint Presentation