Frage | Antworten |
Home Network | BENEFITS: - sharing the internet connection - Sharing files, including backing up files - Sharing peripherals, for example printers DISADVANTAGES: routers are needed to connect the internet to a home network |
LAN | Local area network |
Network security | - Change the default password on your router to stop people from accessing it. |
Encryption | Scrambling data |
Combining Technology | Mobile phones and laptops, for example, are compatible because they can communicate via Wi-Fi or Bluetooth Technology and they both have USB ports. |
Bandwith | The number of bits that can go through the network connection in one second (measured in bits per second, bps). |
Latency | The time in milliseconds between a bit leaving one device and arriving at the other. It is measured in milliseconds (ms). |
bandwidth --> latency | higher bandwidth usually means higher latency |
Wi-Fi | - Wi-Fi devices need to be within range of a wireless access point (‘hotspot’). - This connection is good because it has a good range (60 metres from the hotspot) and is quite widely available. - This connection is not so good because, sometimes, hackers can set up fake hotspots putting users at risk. |
Mobile broadband | - 3G and 4G can be used which have greater coverage than Wi-Fi. - 3G is more secure than Wi-Fi because data is encrypted. - 3G costs money though and downloads are limited. |
Protocols | Protocols are rules that devices follow when they communicate with each other. |
Communication protocols | -VoIP is the set of rules for transmitting audio messages over the Internet. These help people make free voice calls or, combined with a webcam, video calls. - POP3, IMAP, SMTP – these are the rules used when sending emails. - HTTP – this is the protocol of the World Wide Web (WWW). HTTPS is secure |
Security risks part 1 | When you connect to the Internet, your computer is visible to billions of computers around the world. To protect yourself, use a firewall. This is software that permits or blocks connections. |
security risks part 2 | Data can also be stolen through unauthorised access. People should set secure passwords consisting of numbers, punctuation and upper and lower case letters. |
security risks part 3 | -People should also lock their computer when they leave it unattended. -To prevent physical theft of the computer, chains and locks should be used to further protect data that is saved on the machine itself. |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.