You are on page 1of 8

L2 ICT – UNIT 1 : The Online World

Revision Template

Subject Notes Revision


Online Services: Lesson 1 Examples / Notes: Done
Communication websites

Facebook, Gmail, Outlook

Real time information


Information such as weather which is updated frequently

E-Commerce

Buying and selling products over the internet

Government websites
Websites such as gov.uk which provide people with
information about government news.

Education

BBC Bitesize which allows people to get information on


certain subjects.

Entertainment

Netflix, Amazon prime

Download services Play store, App store, Drive, Dropbox

Online Documents: Lesson 2 Examples / Notes:


Compressions (.zip)
Making a file smaller to be able to be sent of transferred
with less slowdown.

Online software for creation

Photopea, Wix, Moonpig

Version control
Able to go back to a previous version of a doccument
Levels of access
Only allowing access to certain people or stopping
actions from being performed.

Online Comms: Lesson 3 Examples / Notes:


Netiquette

The correct way to communicate on the internet.,

Online communities

Facebook, Instagram, Snapchat

Virtual world
VR, Augmented reality

Chat & chat rooms

Whatsapp, Google meet, zoom

Social networking Facebook, Whatsapp, Messenger

Instant messaging
Messages

VOIP – video conferencing

Allowing people to talk over the internet such as in video


games or online meetings.

Cloud computing
Allowing access to more power over the internet making
use of servers instead of your personal computer.

Ubiquitous computing Embedding technology into everyday objects such as


kettles to boil the water when you're not at home.
The Internet: Lesson 4 Examples / Notes:
Cloud computing

Allowing access to more power over the internet making


use of servers instead of your personal computer.

POP (Point of presence)


A location where connections converge to share
information.

NAP (Network Access Point) A device which creates a LAN local area network for other
devices to connect to,

Client Server Architecture


Hardware and software on the computer which is sending
out all of the signals.

Routers

A router is a device which takes a signal and sends it out


wirelessly to other devices to connect to.

Network backbone

The high capacity network that connects different parts of


the networks together.

Internet connection types

Dial-up, Wireless, Cable

Worldwide Web: Lesson 5 Examples / Notes:


Web servers
Web servers allow people to store information on certain
servers rather than stored in multiple places around the
world.

Website structure

Website structure is how the website is laid out in order


to improve productivity.
Components of the URL
Www. is world wide web allowing all servers to connect
together

HTTP
Hypertext transfer protocol is an application protocol for
transmitting html documents.

HTML

Hypertext markup language standard markup language


for documents meant for web browser implementation.

Browsers

Browsers are a way of accessing the internet

Search engines
A search engine is a custom interface designers to allow
people to search for information on the internet.

Email: Lesson 6 Examples / Notes:


Sending an email – how it
works
Server to server using simple mail transfer protocol from
client to recipient email server.

Advantages of email

Easy to use, can attach files, free to use

Disadvantages of email
Can contain viruses, spam emails, phishing emails

Email protocols
IMAP and POP3 are the most used email protocols

Differences between POP &


IMAP POP3 deletes the email from the server and IMAP stores
the message on the server.

Data Exchange: Lesson 7 Examples / Notes:


Network structure

Transmission modes Fibre Optic - glass- instead of sending electric signal it sends
light - in binary- at speed of light in pulses- at the other end is
a receiver. The fibre optic is as thin as a hair. The cables
under the floor need to be careful as they are not coated in
metal, break easily.

Wireless - no wires.
Infra red - energy in the region of the electromagnetic
radiation spectrum. Can be seen, Out of the visible spectrum.
Is shorter than those of radio waves.
Infrared frequencies higher than those of microwaves.
Eg: car locking remotes, TV remote handset

Can be adversely affected by walls or obstructions.

Real time communication

CODEC
Meshing of 2 words - coder and decoder - encoded and
compressed for storage streams of data.
For videos you
Compress- send- decompress at other end.
See diagram on google slides
Changes it from one format into another format so that it
can be used!

Methods of transmission
/cabling/wireless etc SEE ABOVE NOTES

Packet switching
Is a method of breaking data files in small packets or chunks
in order to send them across a network.
Works by broken up into small files and given an IP address
as to where to go, and to know who has sent it. They also
know how many packets have been sent. Puts back together
and ends the file.

Data transfer rates


Speed at which data is transmitted from one device to
another is the data rates

Microwave
A microwave link - in a communication system uses a beam
of radio waves in the microwave frequency in two fixed
locations.
Advantage : no cables required (between 2 buildings)
Multiple channels
Wide bandwidth

Disadvantages: Line-of sight such as obstacle, new building


Weather - atmosphere - lightning
Has to be on a tower - high up

Eg: Repeater - see Slide diagram

Satellite
Multiple receivers eg:
Multipole channels on one satellite
GPS
Sky

Atmosphere can affect it

Serial - only one chunk of information at once


and Parallel Transmission - lots of links that run alongside
each other ( fibre optic cables- so 50 pulses at same time)
bursts at the same time at speed of light.

Client vs Server Working on word doc, saves on pc drive.


On an app, you are working on server.

Databases: Lesson 8 Examples / Notes:


Data storage methods

USB, disk, floppy disk, ssd, hard drive

Databases

Database structure – files,


fields, records

Online databases

DBMS
SQL

Threats to data: Lesson 9 Examples / Notes:


Cyber crimes

Hackers can steal your data

Malicious damage to data

People could infect your computer and steal or lock your


data

Preventative technologies

Tech that ensures your data is kept safe.

Firewalls

Firewalls block unwanted software from making a


connection to the internet.

Access control methods DAC discretionary access control, MAC mandatory


access control, RBAC role-based access control

Disaster recovery
Means of recovering data when it gets lost or damaged.

Business continuity

Benefits and dangers of social


networking Free to use mostly, easy communication, easy to use
Can be bullied, can get viruses, need internet

Managing your E-Reputation

Online monitoring of
movements & communication
A way of making sure that online activity is as safe as
possible.
Current legislation : DPA
(1998), CMA (1990)

You might also like