Sei sulla pagina 1di 13

L2 ICT – UNIT 1 : The Online World

Revision Template

Subject Notes Revision


Online Services: Lesson 1 Examples / Notes: Done
Communication websites Email: electric way of sending or showing people at they
other end anything you need to tell them. You need wifi
or ethernet to send and also and
desktop,laptop,smartphone and etc. you can also send it
to a group of people and there also cc carbon copy or
bcc blind carbon copy . examples. Telling someone
about knew things which have been realised
Real time information Real time information is something which is live and is
updated every second. Mostly important stuff are live not
all. Such as airport flight times because their might be
delays. Also train and buss times as people need to get
to places and be on time so they know so they can either
catch the earlier train or find another way
E-Commerce
E commerce is online services such as online banking so
you know where your money is and what you have spent
it on and also it is more secure there so they are
providing a banking service. Online auctions are services
which you can buy and sell goods on such as ebay or
gumtree but most of the time you have to pay a fee.
Retail sales are buying goods online from a store such as
if you want jacket and you seen it in store you can go
online and order directly to you house also some online
services are only online . publishing can be anything
such as magazines, books and stories. Most people use
the kindle fire software which lets you read books
electronically.
Government websites Online tax return is a service which lets you tell the
government how much money you have made so they
can tell you how much tax you owe. Mainly only meant
for business. E voting is a way to vote when you are
over 18 to vote in the elections before you had to go
down to the department and vote. Online applications are
asking for permission to do something or request
something from them. Such as if you want permission to
extend your house you will need to ask for grant.
Revenue collection is how much you earn and your net
worth. So all got to do with moneyEg online tax return,e-
voting,applications for services and grants,revenue
collection,renewing car tax
Education Online learning is a way to learn something online
without going to the actual place. So if you want to learn
spanish you don't have to go to spanish classes you can
learn on online services. Online training is when specific
company can show you what do online through network
Entertainment Multi user games a source of entertainment which you nd
other people can play together from different places
which is all based online. Radio is a device which plays
radio and lets you know real time information so it is live
and you access on your phone , car radio players and
play different radio stations
Download services Download services are for downloading legal
music,games and video. On the internet you can access
loads of way to download all sorts of things. Download
services are ways to download something from the
online world

Online Documents: Lesson 2 Examples / Notes:


Compressions (.zip) Compression is a way of minimizing a certain file its
there so that all the unnecessary things within the file is
gone its breaks open the file. Compression is also known
as zipping and is done using algorrithm. One file can be
compressed or many can be compressed
Online software for creation It's there so that you can edit a virtual world from within a
games itself. Online software is accessed through a web
browser and is available anywhere that has an internet
connection updates automatically on the server so you
don't need to do it yourself
Version control Version control enables multiple people to
simultaneously work on a single project.
Version control integrates work done simultaneously by
different team members
Version control gives access to historical versions of
your project

Levels of access Part of an access control procedure for computer


systems which allows a system administrator to set up a
hierarchy of users. The low level users can access only a
limited set of information. Whereas the highest level
users can access the most sensitive data on the system.
Called the access rights

Online Comms: Lesson 3 Examples / Notes:


Netiquette Behaving the right way for a certain thing or place. Such
as when you are online there are people watching what
you are doing so you shouldn't say or post things that
can be offensive or harmful to someone. So you should
follow the rules for a certain thing. Conduct yourself
online
Online communities Online communities such as Twitter is that you know
what is happening with communities for example
football. They tell people through online what's
happening
Virtual world A virtual world is a computer-based online community
environment that is designed and shared by individuals
so that they can interact in a custom-built, simulated
world.
Chat & chat rooms Chat and chat rooms is something like your talking
mostly through online for example it's like facetime your
talking believe or its chat like snapchat where your
texting each other. Also a place on the web where users
can communicate,usually through typed words

Social networking Social networking is something you use online to show


or tell people what your doing. And keep them updated
on what they are doing. So you don't have to physically
show them or people with similar interests can
communicate or watch things
Instant messaging Instant messaging is a way of staying connected to
people over the internet. Its way of talking but typing it
instead. Also it saves travel cost and money. An example
is such as whatsapp where you can send a message and
you can see if they've seen it
VOIP – video conferencing Video conferencing is something that people use so that
when they are far away or have a big company and they
need to contact each other and stay in touch and have
meetings without big costs and cheaper and faster way
Cloud computing Cloud computing is something that's on demand that
people use they don't store it without any device they do
it through any device they do it through the internet for
example google drive they do that as its through the
internet and it saves data straight away so you can
access it anywhere
Ubiquitous computing Its when you connect devices that use ubiquitous
computing have constant availability and are always
connected. It also means exciting where. Ubiquitous
computing is where processors are embedded into
everyday objects

The Internet: Lesson 4 Examples / Notes:


Cloud computing Cloud computing gives you access online for work like
google drive which you can access from anywhere if you
have internet and log in details. Cloud computing is
where data is saved on external servers instead of the
users hard drive. External harddrives are owned by
hosting companies such as google which gives you
google drive to store your stuff
POP (Point of presence) an Internet point of presence, the local access point that
allows users to connect to the Internet with their Internet
service provider.
NAP (Network Access Point) Its different ways of connecting to your internet via the
router and you can use wireless and wired or using one
computer to give another computer network
Client Server Architecture Client server architecture is a computing model that
when you send information and it passes the information
on the client
Routers A router is something that lets you allow to connect to
the online world and receive internet everything you do
connected to the router it goes to the router and router
sends it where it needs to go.also they are intelligent and
will try to find the best and fast routes
Network backbone A backbone is a part of computer network that
interconnects various pieces of the network. Providing
path to exchange information through LANs.

Internet connection types Dial up connection is like a phone connection it uses an


analog telephone lines the speed of 56kps it does this by
encoding and decoding and it's done by the modem

DSL- digital subscriber lines. Its has a high speed


frequency uses a different part of the frequency spectrum
than analog voice signals it starts from 960kps download
and 120kps upload

ADSL- provides different bantwitch and supports speed


also.
Worldwide Web: Lesson 5 Examples / Notes:
Web servers

Website structure

Components of the URL

HTTP

HTML

Browsers

Search engines

Email: Lesson 6 Examples / Notes:


Sending an email – how it
works

Advantages of email

Disadvantages of email

Email protocols
Differences between POP &
IMAP

Data Exchange: Lesson 7 Examples / Notes:


Network structure

Transmission modes Fibre Optic - glass- instead of sending electric signal it sends
light - in binary- at speed of light in pulses- at the other end is
a receiver. The fibre optic is as thin as a hair. The cables
under the floor need to be careful as they are not coated in
metal, break easily.

Wireless - no wires.
Infra red - energy in the region of the electromagnetic
radiation spectrum. Can be seen, Out of the visible spectrum.
Is shorter than those of radio waves.
Infrared frequencies higher than those of microwaves.
Eg: car locking remotes, TV remote handset

Can be adversely affected by walls or obstructions.


simplex - goes one direction only A to B

Half duplex- both directions but only one at


a time

Full duplex both directions at the same time


Real time communication
Voice over internet protocol (voip). Calling over the
internet . Communication over the internet

CODEC

Meshing of 2 words - coder and decoder - encoded and


compressed for storage streams of data.
For videos you
Compress- send- decompress at the other end.

Its sending a video over the internet but in different


packets and at they other end where it is being received
and it puts it back together
Changes it from one format into another format so that it
can be used! 0
Methods of transmission
/cabling/wireless etc SEE ABOVE NOTES

Packet switching
Is a method of breaking data files in small packets or chunks
in order to send them across a network.
Works by broken up into small files and given an IP address
as to where to go, and to know who has sent it. They also
know how many packets have been sent. Puts back together
and ends the file.

Data transfer rates


Speed at which data is transmitted from one device to
another is the data rates

Microwave
A microwave link - in a communication system uses a beam
of radio waves in the microwave frequency in two fixed
locations.
Advantage : no cables required (between 2 buildings)
Multiple channels
Wide bandwidth

Disadvantages: Line-of sight such as obstacle, new building


Weather - atmosphere - lightning
Has to be on a tower - high up

Eg: Repeater - see Slide diagram

Satellite
Multiple receivers eg:
Multipole channels on one satellite
GPS
Sky

Atmosphere can affect it

Serial - only one chunk of information at once


and Parallel Transmission - lots of links that run alongside
each other ( fibre optic cables- so 50 pulses at same time)
bursts at the same time at speed of light.

Client vs Server Working on word doc, saves on pc drive.


On an app, you are working on server.

Databases: Lesson 8 Examples / Notes:


Data storage methods Data storage is general term for archives data in
electromagnet to or other forms for use by a computer
Internal and external drives
External is a usb stick so you can move it around take to
different pcs
Internal is built in so it can be removed but only replace if
broken
Databases Where you store valuable data on and then if you need to
go back on it you can go onto and check it to find out
information about something that you saved onto the
data bases
Database structure – files, Fields this is a single piece
fields, records

Online databases

DBMS

SQL

Threats to data: Lesson 9 Examples / Notes:


Cyber crimes Cyber crimes:crimes online such as identity
theft, cloning cards and intellectual property
threat; illegal downloading music, plagiarism
Malicious damage to data Viruses
Trojan horses. Email or message which you
think is good or dont what it is and you click
on it and it put a virus on your computer and
it starts attacking you and whoever sent the
virus can view you
Phishing- pretending to be someone else
Preventative technologies Preventive technologies. Eg firewalls
Access control methods -security software-
protocol systems resource
Firewalls
Security software protects your vital system
resources and controls what users can do
on the operating system.

Access control methods Access control is a security technique that


regulates who or what can view or use
resources in a computing environment
There are two types of access control:
physical and logical. Physical access control
limits access to campuses, buildings, rooms
and physical IT assets.
Disaster recovery Overnight backup of company data &
systems
Data taken offsite
Disaster Recovery services e.g. IBmWarwick
In the event of a fire, flood, plane crash etc
IBM would restore systems on their
computers
DR team go to IBM to restore business data
and run computer systems to provide
Business Continuity

Business continuity

Benefits and dangers of social


networking ❏ Personal data can be stolen
❏ People can set up ‘fake’
personalities
❏ Your pictures can be stolen and
re-used
❏ You have no idea who is at the
other end i.e. age, sex etc. etc.
❏ Good for keeping in touch
❏ You can leave a message and
come back later to see if it has
been answered
❏ Available via app on your phone
/ tablet
Managing your E-Reputation
❏ Be very careful what you post
online - once it is out there, it’s
hard to retract e.g.
Pictures that you don’t want others
to see
- Political views
- Personal comments
- Threats of violence
- Bullying
- Stalking


Online monitoring of
movements & communication Online technology is used to monitor
individuals movements and
communications

❏ Be very careful what you put out


there

- Emails are monitored and filtered


- ISP monitors everything you do i.e.
internet sites you visit
-Mobile phone providers can follow you if
you have ‘location services’ switched on
-Chat rooms and social media posts are
monitored and recorded


Current legislation : DPA
(1998), CMA (1990) Current legislation controls how personal
data
can be used and must be protected by
organisations.

❏ Data Protection Act (1998)

The Data Protection


Act 1998 (DPA) is an Act
of Parliament of the
United Kingdom of Great
Britain and Northern
Ireland which defines UK
law on the processing
of data on identifiable
living people. It is the
main piece of legislation
that governs the
protection of personal
data in the UK.

The Eight Principles of Data Protection


For the personal data that controllers store
and process:

1. It must be collected and used fairly


and inside the law.
2. It must only be held and used for
the reasons given to the
Information Commissioner.
3. It can only be used for those
registered purposes and only be
disclosed to those people
mentioned in the register entry.
You cannot give it away or sell it
unless you said you would to begin
with.
4. The information held must be
adequate, relevant and not
excessive when compared with the
purpose stated in the register. So
you must have enough detail but
not too much for the job that you
are doing with the data.
5. It must be accurate and be kept up
to date. There is a duty to keep it
up to date, for example to change
an address when people move.
6. It must not be kept longer than is
necessary for the registered
purpose. It is alright to keep
information for certain lengths of
time but not indefinitely. This rule
means that it would be wrong to
keep information about past
customers longer than a few years
at most.
7. The information must be kept safe
and secure. This includes keeping
the information backed up and
away from any unauthorised
access. It would be wrong to leave
personal data open to be viewed
by just anyone.
8. The files may not be transferred
outside of the European Economic
Area (that's the EU plus some
small European countries) unless
the country that the data is being
sent to has a suitable data
protection law. This part of the
DPA has led to some countries
passing similar laws to allow
computer data centres to be
located in their area.

http://www.bbc.co.uk/schools/gcsebitesize/i
ct/legal/0dataprotectionactrev1.shtml

❖ Current legislation controls how personal


data
can be used and must be protected by
organisations.

❏ Computer Misuse Act

The Computer Misuse Act


1990 is a law passed by the
British government. It was
introduced to try to fight the
growing threat of hackers and
hacking.

❖ Current legislation controls how personal


data
can be used and must be protected by
organisations.

❏ Computer Misuse Act

The law has three parts. In the U.K., it


is now a crime to :

● Access a computer without


permission
● Access a computer without
permission, hoping to break
another law.
● Change, break or copy files
without permission.

People who break this law can be


jailed for up to 6 months

http://www.bbc.co.uk/schools/gcsebitesize/i
ct/legal/1dataandcomputermisuserev1.shtml

Potrebbero piacerti anche