Revision Notes - Meghan Roles

Download Report

Transcript Revision Notes - Meghan Roles

ONLINE SERVICES
 Communication - For communicating with people who live in a different country. E.g. Facebook,
Twitter, Email.
 Real-Time Information - Provides up to date information for when you need to catch a train or find out
what the weather is. E.g. Train times, BBC Weather, Plane Times.
 Commerce - Makes purchases easier and more affordable. Saves time and is more convenient. E.g.
Amazon, Ebay, Argos.
 Government - Saves time and is more convenient – saves you a trip to the post office to fill in a form.
E.g. Tax returns, E-voting.
 Education - Allows you to do training from the comfort of your own computer and at you own place.
E.g. Online training, Online learning.
 VLE - Cost-effective for the school/college and allows the school/ college to track the submissions of
learners’ work. E.g. VLE’s such as Moodle.
 Business - It helps people from different countries communicate which works out cheaper for
companies as they don’t have to travel to different countries. E.g. Skype, Face-Time.
 Entertainment - Enhances the gaming experience by allowing you to play against people you may
not know. E.g. Multi-user games, Radio and TV players, Video streaming.
Allows users to carry out transactions seamlessly (without the need of
physical money) and globally. E.g. YouTube, Steam.
 Download services -
RULES OF
NETIQUETTE
1. Don’t spam.
2. Don’t be abusive or offensive.
3. Don’t change the subject in a forum.
4. Don’t use slang try and use the correct
grammar.
5. Don’t post copyright material it is illegal.
NOT SHOWING
NETIQUETTE
A girl went onto the website ask.fm after breaking up with her boyfriend and people
started sending her messages such as “Kill yourself” “Nobody wants you” so she jumped
to her death from a high-rise building. After this incident there have been calls asking
for them to shut down the website ask.fm. She had planned her death carefully and left 5
letters to her family. When her mum found out she was treated in hospital for shock. If
anonymous people hadn’t sent her abusive messages telling her to kill herself and that
nobody wanted her this could have been avoided. Also if she didn’t go onto the website
in the first place she wouldn’t have received those messages that pushed her to take her
own life.
REAL LIFE DISASTERS
When Paris Brown was 17 she broke the rules or
netiquette and used her Twitter profile to make a series
of offensive, racist and homophobic posts. The police
showed up at her house and took her phone for
examination. Then on April 14th she was asked to attend
a interview under caution. Also she was forced to
resign from her job. This shows that if you do not follow
netiquette rules you will suffer the consequences and
police may get involved.
CLOUD
What is Cloud Computing? - A process of managing and storing data on
the internet.
What is Cloud Storage? - A process of storing data where you can access
it. The data you have stored will go to a data centre full of computers and
will stay there.
What should you consider when sharing files online? - You should
consider who sees the file and what is on the file before sharing it online,
also is it suitable. Someone could hack your cloud and see all of your files.
A cloud is actually a Data Warehouse full of computers.
CLOUD TERMS
 What does 'Read Only' mean? - This means where you can only read something you
cannot edit or alter it.
 What does 'Read/Write' mean? - This means when you are capable of reading
existing data and accepting alteration.
 What does 'Full Control' mean? - This means when the computer will control all the
movements of the mouse and keyboard, you cannot control the computer.
TERMS
 Collaborate - Working in a group.
 File Sharing - Sharing files.
 Standalone - Where a computer has no internet access and just has the files on it so no
one can hack.
 Compression - When you make a file smaller.
 Upload - Put something into the internet.
 Download - Take something out of the internet.
 Online Software - Cloud computing or something being in the cloud.
ONLINE ADVERTISING
 What is Online Advertising? - Online advertising is a form of marketing
and advertising which uses the internet to deliver promotional
marketing messages to consumers.
 Who would use Online Advertising? - Anyone who wants to advertise
something would use online advertising.
 Why would online advertising be the number 1 choice of place to
advertise your goods/service? - Because lots of people use the internet
so lots of people would see your advertisement.
BENEFITS OF ONLINE
ADVERTISING
1. Offers more value for your money.
2. It is up all the time so anyone can see it at any time.
3. It has a faster and wider reach. It can reach anyone
anywhere.
4. Provides more information at a lower cost.
5. It is convenient for your audience as they can access
your advert as many times as they want, whenever
they want.
ADVERTISEMENT
 Why do organisations use search engines to advertise? - They use search engines to
advertise so when someone types a key word into a search engine their advert or
website will come up instantly.
 How do you get your website to be the top result? - To get your website to be the top
result you have to pay people to put your website at the top of the search engine.
 What is a banner advertisement? - A banner advertisement is a type of advert that
appears at the top of your screen which is usually animated and catches your attention.
ADVERTISEMENT
 When using e-mail marketing companies target potential customers. What is a
potential customer? - A potential customer is a customer that buys goods or services
from another buyer. They normally have a bit of money.
 What is an existing customer? - An existing customer is a customer who you already
have a business relationship with.
 What do you think online advertising needs to do to be successful? - Online
advertising needs to be colourful and needs to catch people’s attention. Also don’t
spam.
UBIQUITOUS COMPUTING
 What is Ubiquitous Computing? - Ubiquitous computing is an
advanced computing concept where computing is made to
appear everywhere and anywhere. An example of this is
Smart Boards, Smart Phones GPS and Digital Audio Players.
 What is Pervasive Internet? - Its always there and always
around you. To make life easier. Easier to manage things.
RFID
What dies RFID mean? - RFID stands for
Radio-Frequency Identification and it is the
use of radio waves to capture information
stored in little tags.
WORLD WIDE WEB
I think there is a difference between the Internet
and the World Wide Web. This difference is that
the Internet is a network and the WWW is a way
of accessing information over the Internet.
TRANSMISSION MODES
 Simplex - When information only goes in one direction. For example TV and Radio.
 Half-Duplex - When information can be sent in both directions but only one communicating at a
time. For example some phone calls and using walkie talkies.
 Full Duplex - When information can be sent in both directions but both parts can communicate at
the same time. For example a telephone, a microphone and Skype.
 Benefits of using Full Duplex over Half-Duplex:
 You can interrupt each other
 It saves time
 It’s a lot quicker

 Serial – Bits of data are transferred one at a time over a wire. Good over large distances. Complex
because data has to be broken into individual bits.
 Parallel – Bits of data are transferred simultaneously over a wire. Faster because more bits are
transferred per second. Shorter distance, maximum about 5 meters.
PROTOCOLS
 What does URL stand for ? - Universal Resource Locator.
 Broken down into 3 parts  Protocol
 Host Name
 Path
 What does HTML stand for ? - Hypertext Mark-up Language. It is the code to
create a web page.
 Why do HTML tags come in pairs ? - They come in pairs to start off the page
and end off the page.
 What does HTTP stand for ? - Hyper Text Transfer Protocol. A protocol used for
the client to connect to the web server or page.
VOIP AND PACKET SWITCHING
 Packet switching is the process of data being broken into ’packets’
before being sent through a network and then reassembled at the
other end. This method is used on the internet.
 VoIP is a group of internet protocols that provides a means of sending
voice and multimedia communication over the internet.
 Any computer system that has a microphone input, speaker or
headphone output and a broadband connection can be used to
transmit and receive voice communication.
 An example of VoIP is Skype.
WIRED AND WIRELESS
TRANSMISSION METHODS
Type
How it works
Infrared
Infrared light
Microwave
Use short wires
Satellite
Transmitted from
satellite
to earth.
Max Speed
1 gb
500 gb/s
3.5 tb
Max Distance
100 m
189 m
26,000 miles
Benefits
Easy to use
Fast
Reliable
No cables needed
Cheap over long
distance.
Limitations
Light could burn out
Suffer from external
interference.
Very expensive.
Example of use
Microwave.
WIRED AND WIRELESS
TRANSMISSION METHODS
Type
Cable used
UTP / STP
Twisted-pair cabling.
Coaxial
Solid copper wire
Fibre Optic
Glass or plastic.
Uses light to transfer information.
Max Speed
100 mb/s
1000 mb/s
2.4 gb/s
Max Distance
100 m
500 m
80 km
Benefits
Fastest copper-based
medium
Less expensive than
STP cables
Cheap.
Easily handled
Fast information.
Works over long distance.
Limitations
Interrupted by radio
frequency
interference.
Availability.
Interrupted by noise
Lose light over long distance.
Not basic so very expensive.
Example of use
At school with
computers
Virgin TV
Broadband.
TYPES OF PROCESSING
Type of processing
Description
Example
Advantages
Disadvantages
When the interaction between
a webpage and code occurs
directly on a user’s computer.
A button roll over – where
some code is triggered when
your mouse pointers moves
over part of the webpage.
Speed: The interaction may be
faster once the code has been
downloaded with the page.
It is browser specific: Not all
scripts work the same way on
all browsers
Client-side processing
Security: It is more secure as
the code comes with the page
(not the browser)
When the interaction between
a webpage and a computer is
processed through the server
Server Side Processing
Search Engine Results.
Efficiency: complex code may
run more efficiently as it does
not have to be download to the
user’s computer.
Browser independent: Can be
run on any browser.
Speed: Performance is only
affected by the speed of the
web server.
Computer speed: It can be
affected by the speed of your
own computer.
Security: Exchange of data
over the network may present
security risks.
Overloading: A server needs
to be able to cope with large
volumes of users.
COMPRESSING FILES
 Working with online documents means that files need to
be frequently uploaded for sharing or downloaded to be
used for local processing. Some files can be extremely
large which means that it can take a long time to send.
To reduce this problem you have to compress the file
(reduce in size) so it sends quicker. Some people do this
by converting them into zip files.
CONTROL OVER ONLINE
DOCUMENTS
There are many different levels of access when it comes to sharing files. The 6 main levels are :
 Version control - this is a way of tracking changes to documents and making sure that you are
working on the most up-to-date version.
 Locked – if a document is locked, it isn’t possible to open it. If will only become unlocked once no
users are accessing it.
 Files permission – access rights granted to specific users and groups of users. These rights
control which users can view or make changes to the contents of the system.
 Read only access – this allows users to look at and read a document, but not to change it. You
teacher may create a text book that you are able to access and read, but not make any changes
 Read / write access – this allows users to read, but also to change the document.
 Full control – this allows users to retrieve a document, read it, edit it, add a new document or
delete or archive an existing document. Full control is usually given to people who administer the
system. They may be senior people within the organisation or senior administrators who report
directly to senior management.
KEY TERMINOLOGY
 Online community - a virtual community, which exists only online. It may be open to anyone







like a bulletin board or restricted by interest like some scientific societies.
Network of friends – a group of people who jointly keep up-to-date contact online. This may
be a specific network, such as The National youth Science Forum or more general like
Facebook.
Virtual world – an online community which meets in computer-generated world, for example
the large multiplayer online games.
Netiquette – short for internet and etiquette or network etiquette. This is a set of
conventions or rules how to communicate with other users. The main objective is to prevent
people causing annoyance or offence to others.
Chat – any kind of real-time communication over internet
Chatroom – large-scale interactive conferencing with many people involved in the same
conversation at the same time.
Profile – a collection of personal data about a specific person. This includes biographical
information, interest and photographs.
Emoticons – images or smiley or sad faces that express emotions like smiling, laughing,
crying, winking, being happy or angry.
INFORMATION EXCHANGES
 Web logs (blogs) – these are frequently updated online journals with diary-like entries that allow people to express their thoughts and feeling
sand give details of their daily activities. Typically a blog includes text, photos and sometimes video.
 Microblogging sites - these are sites that allow users to create and exchange very short text entries. A popular example of this types of site is
Twitter.
 Wikis - these are websites that provide information that visitors can extend and edit. They allow users to share information and are useful for
research. The best known example of a wiki is Wikipedia, the online encyclopaedia that can be updated by contributors.
 Chatrooms - these are large interactive communities where people take part in the same conversation at the same time.
 Podcasts – are a series of audio or video files that can be downloaded from the internet. If a video is published in episodes like a blog, this
process is known as a Vlog (video blog). YouTube is an example of a video-sharing websites where individuals can share blogs.
 Virtual Learning Environments – are used by schools to distribute resources, support learning and asses progress online. It is an educational
system based online, usually it contains learning materials, tests, projects, presentations, revision materials and allows interaction between
teachers and students.
 Social networking websites – allow members interact and communicate by setting up a profile. Examples are Facebook, Myspace, LinkedIn,
Google+, Twitter. Social networking changed the way we communicate. The information is shared quickly, cheaply and efficiently. It is a great
way of staying in touch with friends and family. But, if misused or abused can lead to very serious consequences.
 Instant messaging – allows an exchange of textual messages often with emoticons instantly and at no cost. It is done in real time and
responses can be received instantaneously. But emoticons can be misused and misunderstood and instant messages can spread viruses.
 Voice over Internet Protocol (VoIP) – allows people to communicate in real-time using voice and video messaging and is available between any
2 points in the world at no cost, if done as internet-only conversation. Skype is a widely used example of VoIP service. There are lots of
benefits: relatives who live in different countries can maintain contact – grandparents are able to see their grandchildren grow, businesses
use for online conferencing and meeting saving travel time and costs and costs of hiring a venue.
THE INTERNET - TERMS
 Network - a group of computers connected together by communication channels and that have the capability of
sending and /or receiving information between them.
 Protocol – is a set of rules that tallows a computers system to connect with a different system to transfer data.
 ISPs - An Internet Service Provider (ISP) is a company which provides access to the internet for individuals or other
companies.
 Point of Presence (POP) – this is an ISPs access point to the internet. This is a location that contains all the
hardware that allows internet users access to the internet. ISPs may operate a number of POPs to allow a good
access to the internet.
 NAP – an interchange between networks within the internet. It allows ISP’s to interconnect with each other.
 IP Protocol - IP (Internet Protocol) is the primary network protocol used on the Internet. IP supports unique
addressing for computers on a network.
 Transmission Control Protocol - The protocol which takes data from a user’s application program and passes it to
the IP for transfer across the internet. The reverse operation is performed at the destination computer.
 TCP/IP – The close relation of the TCP with the IP means that the terms are usually used in combination.
 FTP – File transfer protocol – this a standard protocol that allows files to be transferred between two computers on
a TCP-based network.
INTERNET INFRASTRUCTURE
 Server – this is a computer or program that runs purely to serve the needs
of other computers. It runs special server software to service the
requirement s of the users (clients). There are several types of servers,
including file servers and printer servers on a local area network (LAN),
and web and email servers that manage communication with the internet.
 Client – this is a computer that uses the services provided by the server.
 Router – this is a piece of hardware that connects two or more networks.
In relation to the internet, data from the ISP is sent into the network and
the router then directs the data packets to the correct destinations.
 Connecting Backbone – the main connecting data routes between large
networks on the internet and smaller networks in local regions.
COMPUTER THREATS
 There are 5 main threats to your computer these are :
 Opportunist Threats - People who find unattended computers when they are logged in.
 Computer Viruses - They can come in e-mails and downloaded files. They can multiply and infect files or browsers.
 Malware - Examples of this include computer worms (essentially a computer virus that does not need to attach itself to a file
or message).
 Phishing - A threat that tries to gain passwords and private information by tricking people into giving out personal information.
 Accidental damage - This may happen if you drop your phone and it smashes or gets covered in water. This can result in
losing all of your data.
 Tips on how to prevent these threats :
 Install anti-virus software's
 Don’t click on email links or attachments form a source you don’t know
 Beware of misleading pop-ups
 Beware of odd emails from companies you do business with
 Install an anti-spyware programme
 Keep a good back-up
COMPUTER THREATS
Preventative Measures :
 Physical Barriers - A physical barrier is something physical that stops people or something from
damaging your computer, such as locking your office.
 Password Control Access - A password is a set of characters that only the computer user knows
that allows access to files and data. A strong password is a password that no one is likely to get. In
a strong password you should include letters and numbers. You should change your password
regularly as people would then find it hard to guess your password. You also shouldn’t as you may
forget it.
 Access Levels - This can be set up to allow people to have access to only specific levels of an
application. The different types of access levels are Read-only, Read/Write, Full Access.
 Anti-virus Software - It is a software that intercepts viruses before they can harm your computer.
You should keep updating this software so it can be the best version it can be and work properly.
 Firewall - A Firewall is a piece of software that monitors all data arriving at your computer from
the internet and all data leaving your computer. It stops anything it thinks is harmful or unwanted.
 Encryption - Encryption is used to code data so that it cannot be read by anyone as they need the
code to work out what is says. I think it is important as only the person who came up with the code
can read what is says so if you were sending important information no one could read it.
HACKING
 Hacking

What is Hacking ? - Hacking is where someone gains unauthorised access to your files.

What does it mean to you ? - It is something bad you should never do.
Some people hack computers or accounts for many different reasons some of the reasons
are for money or just for the thrill. One example of hacking that was in the news was the Sony
PlayStation Network hack which happened in April 2011. Here are 6 main facts about the
hacking incident :
 Hacked by a group of hackers called Anonymous.
 PlayStation Network was unavailable for 5 days.
 They took data from the 10 million users.
 Usernames, passwords and credit card information was taken.
 They refunded people for the loss of services and games.
 It took a week for the hackers to hack the network.
BACKING UP INFORMATION
There are many ways people can back-up important information such as patient records. If there
was a girl called Sophie and she wanted to back-up patient files here is some ways she could back
it all up.
HTML AND WWW
 HTML is a computer language used to create web pages. You can create HTML directly in the
language itself or by using authoring software (such as Adobe Dreamweaver or Microsoft
Expression). HTML is a language which relies on a series of tags. Tags usually operate in pairs.
HTML AND WWW
 The worldwide web also known as WWW. Consists of millions of web pages linked together, plus
the content that appears on those pages such a text, images, animated banners, interactive
components. The content of the worldwide web is held on individual web pages which are
gathered together from websites of associated information. Web pages are connected using
hyperlinks. Websites are held on a computer called web server, which is connected to the
internet and delivers web pages to users’ computers.