ICT Topic 2 : connectivity

Descrição

edexcek
Tj Denham
FlashCards por Tj Denham, atualizado more than 1 year ago
Tj Denham
Criado por Tj Denham mais de 8 anos atrás
7
0

Resumo de Recurso

Questão Responda
Home Network BENEFITS: - sharing the internet connection - Sharing files, including backing up files - Sharing peripherals, for example printers DISADVANTAGES: routers are needed to connect the internet to a home network
LAN Local area network
Network security - Change the default password on your router to stop people from accessing it.
Encryption Scrambling data
Combining Technology Mobile phones and laptops, for example, are compatible because they can communicate via Wi-Fi or Bluetooth Technology and they both have USB ports.
Bandwith The number of bits that can go through the network connection in one second (measured in bits per second, bps).
Latency The time in milliseconds between a bit leaving one device and arriving at the other. It is measured in milliseconds (ms).
bandwidth --> latency higher bandwidth usually means higher latency
Wi-Fi - Wi-Fi devices need to be within range of a wireless access point (‘hotspot’). - This connection is good because it has a good range (60 metres from the hotspot) and is quite widely available. - This connection is not so good because, sometimes, hackers can set up fake hotspots putting users at risk.
Mobile broadband - 3G and 4G can be used which have greater coverage than Wi-Fi. - 3G is more secure than Wi-Fi because data is encrypted. - 3G costs money though and downloads are limited.
Protocols Protocols are rules that devices follow when they communicate with each other.
Communication protocols -VoIP is the set of rules for transmitting audio messages over the Internet. These help people make free voice calls or, combined with a webcam, video calls. - POP3, IMAP, SMTP – these are the rules used when sending emails. - HTTP – this is the protocol of the World Wide Web (WWW). HTTPS is secure
Security risks part 1 When you connect to the Internet, your computer is visible to billions of computers around the world. To protect yourself, use a firewall. This is software that permits or blocks connections.
security risks part 2 Data can also be stolen through unauthorised access. People should set secure passwords consisting of numbers, punctuation and upper and lower case letters.
security risks part 3 -People should also lock their computer when they leave it unattended. -To prevent physical theft of the computer, chains and locks should be used to further protect data that is saved on the machine itself.

Semelhante

The Internet
Gee_0599
Flash Cards Networks
JJ Pro Wrestler
Digital Devices
Justine Hammond
Quiz - Viruses
DolphDog
Input and Output Devices - Cambridge Nationals ICT
Beth Coiley
Networks
Will8324
How Legislation Affects Computer Users - Cambridge Nationals ICT
Beth Coiley
Online Shopping
Cam Cumming
Systems Flowcharts
Will8324
Software Application
Dim Ah
Types and Components of Computer Systems
Jess Peason