Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
My Theory Booklet
Introduction
1 Online Services 1 Mark __ /8
OK Must review
2 Online Services 2 Mark __ /8
OK Must review
3 Online Advertising Mark __ /11
OK Must review
4 Online Documents Compression Mark __ /7
OK Must review
5 Online Software & Backups Mark __ /11
OK Must review
6 Collaborative Working Online Mark __ /8
OK Must review
7 Online Communication 1 Mark __ /7
OK Must review
8 Online Communication 2 Mark __ /7
OK Must review
9 Voice Over Internet Protocol Mark __ /13
OK Must review
10 Cloud Computing Mark __ /7
OK Must review
11 Ubiquitous Computing Mark __ /9
OK Must review
12 The Internet - Hardware Mark __ /8
OK Must review
13 The Internet Network Diagrams Mark __ /5
OK Must review
14 Connection Methods Mark __ /12
OK Must review
15 The Internet - Protocols Mark __ /9
OK Must review
16 World Wide Web Mark __ /8
OK Must review
17 HTML Mark __ /6
OK Must review
18 URLs Mark __ /8
OK Must review
19 Search engines Mark __ /8
OK Must review
20 Email Purposes & Uses Mark __ /16
OK Must review
21 Email - Protocols Mark __ /7
OK Must review
22 Data Exchange Packet switching Mark __ /10
OK Must review
23 Data Exchange Transmission Mark __ /11
OK Must review
24 Wired Transmission Methods Mark __ /14
OK Must review
25 Wireless Transmission Methods Mark __ /8
OK Must review
26 Client-side Processing Mark __ /12
OK Must review
27 Server-side Processing Mark __ /9
OK Must review
28 Database Theory Mark __ /9
OK Must review
29 Databases in practice Mark __ /15
OK Must review
30 Threats to Data Mark __ /6
OK Must review
31 Protection of Data Mark __ /15
OK Must review
32 Legislation Mark __ /11
OK Must review
33 Key Terms
Introduction What Is The Online World?
Imagine a business with thousands of staff & customers in many countries
Unit 1 is about looking behind the scenes at many different parts of this online world
Security Wi-Fi
Well see what kind of threats Well see how data travels online,
make security such a big deal today such as wired & wireless methods
Introduction The Exam
The Unit 1 exam will be your biggest challenge on this course.
Thats because to do well you need to be able to:
Handle basic questions, such as giving the meaning of technical terms
But also expand your answers in more challenging questions, such as to discuss the
advantages & disadvantages of technologies or evaluate the impact on people & business.
+ =
So being able to expand your answers is the key to coping with different types of exam questions:
So you MUST develop the basic knowledge PLUS the expanded understanding.
Thats why youll need this booklet, then make your own notes & then do practice questions
1 Online Services 1
That means moving data in the form of They are constantly updated for people
text, photos, video and audio who need to get the latest information
Commerce Government
Commerce means business so these These involve official public services
services involve money in some way.
eg local councils & national government
eg online shopping & banking collecting taxes
1
2 Online Services 2
Entertainment Download Business
Means services for leisure Means LEGAL download Means companies using
and fun services, such as for websites to increase
games, music & movies efficiency & save
money
2
3 Online Advertising
Online ads use video Peoples online behaviour is tracked using Online ads try hard
and audio plus small text files called cookies. Sites access to get you to click
animation to get cookies to display ads based on your links direct to the
your attention interests shown by searches & page views. advertisers site
3
4 Online Documents File Compression
4
5 Online Software & Backups
Having a back-up Getting an upgrade You dont need to pay A business doesnt
online means a copy used to mean a full price for a need to buy its own
of your files are getting a new CD. software product on servers because the
stored on web But online a CD. Instead, you software & files will
servers, so you can software is can pay monthy so be stored online. So
restore the files if updated the software is more this saves the
theres a problem. automatically. affordable. business money.
5
6 Collaborative Working Online
Online Software
Levels of File Version
Access Permissions Control
Restrictions are set at logon: Settings that control what When lots of people can
Staff can access areas users can do to a file: edit a document, its vital
depending on their role Read: View only to show which is latest
Students & teachers see Read/Write: View & edit version eg filenames can
different parts of network Full control: Also delete use numbers or dates.
6
7 Online Communication 1
Online Communities
An online community or network of friends is a group that only exists online
An example is social networking sites that connect people with similar interests
Another example is a virtual world, such as Second Life that only exists online
Some need members to be online at same time eg online gaming
Others can interact at different times, eg learning community on a VLE
7
8 Online Communication 2
Communicating online includes instant messaging (IM). Online
communication also requires rules and involves users in developing a
profile for their online presence
8
9 Voice Over Internet Protocol - VoIP
Advantages Disadvantages
9
10 Cloud Computing
Cloud Storage
Cloud computing is where you use external servers instead of your hard drive.
The external servers are called hosts and are owned by a hosting company
Some well-known hosting companies are Dropbox , Google & Microsoft
Users can access software, data and storage from their hosting company
You access all that using your web browser
Advantages Disadvantages
Cost Anytime, Reliability Security
Savings Anywhere & Speed
You only pay for the You can access your A poor hosting You have to trust the
storage you use, files and software service can mean hosting company to
rather than having from anywhere in the servers are keep your files safe,
to buy & maintain the world, as long as slow, or they otherwise there is a
all the server there is an Internet crash and the risk from hackers.
hardware. connection service goes down
10
11 Ubiquitous Computing
RFID
Radio Frequency Identification Chips (RFID) are a
way to embed processors into everyday objects
Used to identify & track products for stock control
Like a barcode, but doesnt need to be scanned
This cap flap only opens for As a tagged product is placed An RFID scanner by the door
an animal wearing the inside, this fridge can of a shop can read the chips
correct RFID chip automatically read the RFID as they pass thru and
embedded in collar. Pets chip and use the data to sound an alarm if the
also get RFID microchips monitor & order groceries. product is stolen
11
12 The Internet - Hardware
The Internet
The Internet is a global network of interconnected computers that allows
packets of data to be exchanged between computers and devices.
Internet Hardware
A computer/device that uses services provided by a server
Client The computer you use to access the Internet is a client
Devices that route (direct) data traffic through a network
Routers They are intelligent and will try to find the best routes
A big cable (often fibre optic) that connects a large
Backbone number of devices in the core of the Internet
Runs special software to serve other computers
Server Different types include file, print, web and email servers
Form the connections between all this hardware
Cables Includes all kinds of cable, such as fibre & telephone lines
12
13 The Internet Network Diagrams
Sample diagrams
Is a network on one site, like a school, Is a network that spans a whole region,
or one building, such as an office block or country or globe, eg the Internet
13
14 Connection Methods
Bandwidth
Is how we measure the speed of Internet connection.
TCP IP
Transmission Control Protocol Internet Protocol
TCP is responsible for: IP is responsible for:
Breaking data into packets Handling the routing of packets
Assembling the packets again Thats addressing, sending and
when they arrive receiving packets over the Net
15
16 World Wide Web
16
17 HTML
Create a line
<br> break
<p>Some text</p><br><p>More text</p>
<img src=photo.jpg>
<img> Insert an image src means source
It tells the browser what file to display
<a href=www.argos.co.uk>Click here</a>
<a> Create a hyperlink href means hyperlink reference
It tells the browser what site to open
Meta-tags
Special tags at the start of a page that are used to give details about its content, such as:
<meta name="description" content="Information about Queen Elizabeth School">
17
18 URLs & Web Protocols
Web Protocols
There are several protocols or rules for handling all the data for webpages.
They are included in the URL so that the browser knows how to handle that page.
FTP HTTP
File Transfer Protocol Hypertext Transfer Protocol
An old protocol that was invented HTTP is the set of rules that
even before the Web was born handle what we do on the Web
It is still used to upload and It handles your REQUEST to load a
download files from a server page from a web server
It is often used by web developers It also handle the RESPONSE to
to transfer files to their web server download the web page and all its
But to use FTP, you usually need a files to your computers
username and a password
Secure HTTPS
The S in HTTPS means secure.
Data in the webpage is scrambled
before sending across the Internet
So if data is intercepted, it cant be
understood
Protects privacy from hackers
18
19 Search Engines
To collect details of
websites, the search
engines use
automated
programs (or bots)
called Web Spiders
or Web Crawlers.
Search for an exact Exclude all results Find all variations Find one keyword or
word or set of words that contain a of a word (called another, use the term
certain word a wildcard) OR (in CAPITALS)
19
20 Email Purposes & Uses
Advantages Disadvantages
Attachments Junk Email - Spam
You can attach multiple files, such Spam or junk email has
as images or documents become a massive problem
Copy Phishing
Use cc to send copy to other people Fake emails designed to trick
Or bcc to hide addresses from others people to give personal details
Webmail No Access
Gmail & Hotmail use cloud servers Not everyone has email or
so can access email anywhere they might not logon regularly
20
21 Email - Protocols
21
22 Data Exchange - Packet Switching
Parts of a Packet
Packet switching is the process of data being broken into packets before
being sent through a network and then re-assembled at the other end.
Advantages Disadvantages
Packets chose different Packets give security If one or more packets
routes so traffic flow is benefit because if are lost or corrupted
efficient intercepted, the hacker during transmission, the
Big files can still be sent will only have one part whole file will not be
but dont clog network of a file received correctly
22
23 Data Exchange - Transmission Modes
Modes
Transmission modes are the ways devices on a network
communicate & transmit data
Simplex One Way
Signals go in
one direction at a time
Duplex Two Way
Signals go in
both directions at same time
Duplex - Take Turns
Transmitting Bits
Two ways of transmitting digital data as a stream of bits
Method Data Transfer Benefit Limitation
Bits of data are Complex because
Serial transferred Good over large data has to be
one at a time over distances broken into
a wire individual bits
23
24 Wired Transmission Methods
24
25 Wireless Transmission Methods
25
26 Client-side Processing
Example 2 Slider
Another common
interactive feature on
websites is a slider
where you click or swipe
to scroll through images.
This is created using
code in a client script.
Advantages Disadvantages
Speed Browser-specific
Processing is faster on the client Different browsers process client
because data does not have to travel scripts in different ways,
back to the sever across the Internet therefore a web developer
Security cannot be sure how their website
Data cannot be intercepted on the will appear on a screen on the
client in the same way it can be when client side
data is transmitted back to the server Computer speed
across the Internet The web developer is relying on
the speed of the client computer
to deliver the interactive features,
so if that is slow then the
processing will be slow
26
27 Server-side Processing
Advantages Disadvantages
Servers are powerful computers Security
A web server is likely to be way more When data is send back from the
powerful than a client computer, so it can client, it has to travel across the
process data faster Internet where there is more risk of
No browser involved security threats
Servers dont use Browsers so there are Overloading
none of the difficulties you get on the If a lot of users are asking the
client with different brands webserver to process data, it could
Efficient overload the server and cause it to
Everything is done on the server, so no crash (eg when thousands of people
need to wait for downloads etc try to book gig tickets).
27
28 Database Theory
What is a Database?
A database is a structured collection of data
A table stores a set of data e.g. details of all the students in school
A record is one row that stores data about a single item eg a students details
A field are the columns in a table eg forename, surname, gender, date of birth
The primary key is a special field with a unique identifier eg a student ID
Data Types
Says what kind of data is going to be stored in a field
Text Any kind of characters, including letters & numbers eg LA6 2HJ
Number Numerical values eg 1.5
Date/Time Dates and times 01/04/2014
Boolean One of two values, such as Yes/No or True/False Yes
Relational Databases
Most databases need more than one table to store all the data
So the tables need to be linked (or related) to create a relational database..
s
28
29 Databases in Practice
SQL
SQL is the language used by a DBMS to actually create & search a database
It has a Data Definition Language (DDL) to set-up the tables
And it has a Data Manipulation Language (DML) for updates & search queries
Data Validation
Validation means checking data on input to see if it meets certain rules
These validation rules check that the data is sensible (but cant check if correct)
Here are some different kinds of validation rules
Presence Check to see if data has been entered & not left blank
Range Check values are in sensible range eg effort grades between 1 & 5
Format Check that data is in required format eg a date is DD/MM/YY
Check digit Use digits in a code to check the data is right eg a barcode
29
30 Threats to Data
Opportunity Threats
A companys network security can be
breached by people who take a random
opportunity, such as an unattended PC
Computer Viruses
Viruses are malicious programs designed to
replicate and spread across a computer or
a network to damage or corrupt files & data
Other Malware
Malware is the name for several other
types of malicious software, such as
Trojans, worms, adware, spyware and
other nasty software that aims to cause
damage to files or to steal data
Phishing
Means when hackers use fake emails or
fake websites to trick people into clicking
links and then entering their personal data,
such as bank passwords
Accidental Damage
This could include floods, or fire or
hurricanes or damage from
untrained users
Hackers
Means people who purposefully try to
gain unauthorised access to a computer or
a network. But bear in mind that a high
proportion of hackers are people who
actually work for an organisation.
30
31 Protection of Data
Physical Barriers
Means protection such as locks on doors, or
CCTV & even turning computers off at night
Access Levels
Ensures people only have access to the parts of
the system they need. (Staff would also need
training before gaining greater access.)
Anti-virus Software
Software that works by scanning your files &
then deleting a virus or put safely in quarantine.
Firewall
Software that monitors data coming in and out
of a network to protect it from viruses, malware
and hackers. It puts a wall around a network.
Encryption
Means scrambling data to turn it into a secret
code before sending it over a network, or the
Internet so hackers cant decode & understand it.
31
32 Legislation
32
33 Key Terms
29 DBMS Software that allows you to create & use your own databases
14 Dial-up Old fashioned way to connect to Internet via modem & phone
18 Domain name (URL) The name of a site & the main part of the address e.g. Nike.com
33
34 Key Terms
13 Network Access Point (NAP) Provides a wireless hotspot for people to use e.g. in a library
8 Netiquette Code for behaviour online, such as not using UPPER CASE
25 Network Interface Card (NIC) Hardware for receiving wireless thats built into todays computers
34
35 Key Terms
23 Serial Transmission Where bits of data are transferred one at a time over a wire
27 Server-side processing Processing data on the web server e.g. put info in a database
23 Simplex Data can only transmit in one direction at a time e.g. TV remote
35
36 Key Terms
7 Wiki Sites where authorised users can logon to add or edit content
14 Wi-fi hotspot Location where you can get wireless Internet, often for free
24 Wired Transmission Methods Ways to transmit data using cables e.g. UTP or fibre optic.
25 Wireless Transmission Methods Ways to transmit data with NO cables eg infrared & microwave
4 Zip A way to compress or reduce file size for storage & sending
36