Provides the ability to communicate with others. Could be via a website, imessage or app
Entertainment
Website designed for entertainment purposes e.g. TV catchup
Educational / VLE (Virtual Learning Environment)
Ability to learn online e.g. Moodle
Governmental
Allows you to access opportunities like online tax returns etc.
Real time Information
Provides the ability to access information as it happens. Could be through an app, website or electric signage
Commerce
More related to money than others. Ability to purchase items, check bank balance etc.
Download
Allows you to download apps, music, videos etc.
Business
Communicate with colleagues or complete work from home
Online Advertising
Pay Per Click
Advertisers pay publishers when the ad is clicked
Affiliate Model
Website about a certain topic promotes other websites related to the same topic
Banners
A picture or text at the top of a website promoting a business or product
Email Marketing
Marketing commercial messages to groups of people using their email
Benefits
Targeted audience
A good way of branding
Trackable e.g. measure number of clicks
Cost effective
Drawbacks
Can be irritating
People might delete it without reading it
Not everyone uses the Internet
Internet frauds e.g. credit card details can be stolen when a purchase is made
Slows down the webpage
Online Documents
Compressing Files
Used to reduce the size of files
How it works
Documents are stored online and can be edited and shred with people by inserting their email address. The document is sent with a secure link to the one document (no extras made). Collaborators can edit and save the document
e.g. once the document is edited by someone else you can see the changes immediately i.e. no confusion with updates or different versions
Benefits
It is free
No more confusion with numerous copies
Different types of documents are able to be stored e.g. presentations
Secure
Immediate availability
Drawbacks
Can be time consuming
Difficulties determining authenticity and reliabiltiy
Can be low quality
Ubiquitous Computing
An advanced computing concept where computing is made to appear everywhere and anywhere
RFID (Radio Frequency Identification)
A technology used in Ubiquitous Computing. It is a chip implanted into an object which can be used for tracking
Cloud Computing
Online Storage
Practice of storing data with a third party service through the Internet
Storing, managing and processing data online rather than on a local server or personal computer
Learning Aim B: Components of the Internet
The Internet (Interconnected Networks)
Internet Infrastructure
Client
A computer/workstation that is capable of obtaining information/applications from a server
Server
A computer program that provides services to other computers
Router
A small device that joins multiple networks together
Internet Key Terms
The Internet
A global computer network providing a variety of information and communication
facilities consisting of interconnected networks
WWW (World Wide Web)
An information system on the Internet which allows documents to be connected by hyperlinks enabling the
user to search for information
IP (Internet Protocol)
A set of rules governing the format of data sent over the Internet
TCP (Transmission Control Protocol)
A protocol developed for the Internet to get data from one network device to another
FTP (File Transfer Protocol)
Protocol that allows users to copy files between their local system and any system they can
reach on the network
ISP (Internet Service Provider)
A business/organization that offers users access to the internet and related services
POP (Point Of Presence)
The point at which 2 or more different networks or communication devices build a connection with each other
NAP (Network Access Point)
Public network exchange facility where ISP's connected with one other in peering arrangements
Connecting Backbone
The principal data routes between large, strategically interconnected networks and core routers on the internet
World Wide Web
URL's (Uniform Resource Locator)
The address of a certain website on the Internet.
Features: no spaces or other characters and uses forward slashes to indicate different directories
Search Engines
A website used to search for other websites
ISP (Internet Service Provider)
A business/organisation that offers users access to the Internet
HTML (Hyper Text Mark-up Language)
A system for tagging files to achieve effects on World Wide Web pages
Web Browser
A package used to access the Internet
Internet Connection Methods
Dial Up
Using a modem to connect to the Internet. The modem connects to the computer and standard phone lines which serve
as the data transfer medium
Broadband
Bandwidth
A range of frequencies within a given band that is used for transmitting a signal
Transmission Rate
The speed at which a network device communicates within the network
Wireless
Using radio, microwaves etc. (as oppose to wires and wires) to transmit signals
Email
Features
CC (Carbon Copy)
An address typed into the CC line in an email means they will receive a copy of the email you're sending
BCC (Blind Carbon Copy)
A copy of an email sent to a recipient whose email address doesn't appear in the message
Address Book
A database that stores email addresses of people who you have emailed
Attachments
A file attached to an email
Priorities
You can assign a priority to an email
Benefits
Delivered extremely fast compared to traditional post
Can be sent 24/7
Emails can be sent and received from any computer in the world with Internet access
Cheaper than sending a letter
Emails can be sent to one person or several
Drawbacks
Recipient needs Internet access to receive the email
Viruses are easily spread through attachments
Phising
Spam
Email won't be read until the receiver has logged on
UTP cables are basic pairs of cables twisted together. STP cables are similar but have a foil shielding
Coaxial
A solid wire core separated from a copper-braided outer cable by a plastic sheath. The inner cable transmits the data and the outer cable connects to earth.
FibreOptic
Light is used to carry data and information which is passed down cables. The cable is made of glass and thinner than a human hair which makes it flexible and strong.
Infrared
Short range data transmissions using infrared light.
Microwave
Short wavelength radio transmissions working at high frequencies
Satellite
Data is transmitted to Earth from a satellite, which relays it to the relevant receiving station on Earth
Transmission Modes
Simplex
Data is only transferred in one direction e.g. Radio Broadcasting
Half Duplex
Data is transferred in 2 directions but one at a time. e.g. Walkie Talkies
Duplex (sometimes Full Duplex)
Data is transferred in 2 directions simultaneously e.g. Telephone Conversation
Serial Transmission
Bits are transmitted one at a time over a single channel. Reduces cost of cable but makes transmission slower.
Parallel Transmission
A number of bits are transmitted simultaneously over an equal number of channels
Client Side Processing
Operations performed by the client in a client-server relationship in a computer network
Server Side Processing
Operations performed by the server in a client-server relationship in a computer network
Data Storage
Online Databases
A database accessible from a network e.g. the Internet as appose to one held on attachable storage e.g. a CD
DBMS (Database Management Systems)
Software that handles the storage, retrieval and updating of data in a computer system
Relationships
A situation that exits between 2 relational database tables when 1 table has a foreign key that references the primary key of other tables
Data Types
A particular kind of data item defined by the values it can take, programming language used, or operations that can be performed on it
Database Structure
A set of approaches for organising large collections of computer files commonly relating to a single subject
Learning Aim C: Issues with Opperating Online
Type of Threats to Data
Phising
The practice of sending emails to people pretending to be a reputable company attempting to get hold of personal details e.g. credit card details
Malware (Malicious Software)
A piece of software specifically designed to disrupt or damage a computer system e.g. a virus
Opportunist Threats
When a computer is still logged on people take the opportunity to search for personal information e.g.passwords
Accidental Damage
Damage is done to your device accidentally e.g. water spills
Viruses
A piece of code able to copy itself which has a harmful effect on your device e.g. corrupt systems, destroying data
Personal Safety
Identity Theft
The fraudulent practice of using another persons personal information to obtain credit card details etc.
The Importance of Security
It is important to protect your data so you don't lose valuable and sometimes irreplaceable information/files
Preventative and Remedial Actions
Firewalls
A system designed to prevent unauthorised access to or from a private network
Encryption
The translation of data into a secret code
Back Up and Recovery
Copy files onto a second medium in case the first medium fails
Password Control
Can include changing your password often and making it hard to guess
Physical Barriers
A barrier used to protect your device- this can be as simple as a burglar alarm
Access Levels
You are able to choose who can see and edit your files
Anti-Virus Software
A form of software you install on your computer that updates every so often to protect your device from viruses