|
|
Created by Harvey Quinney
over 6 years ago
|
|
| Question | Answer |
| Communication | Let people keep in touch that means moving data in the form of text,photos,videos and audio |
| Real-time information | services that provide up to date info |
| Commerce | Commerce means business so these services involve money in some way |
| Government | These involve 'official' public services |
| Entertainment | Means services for leisure and fun |
| Download | Means LEGAL download services , such as for games,music and movies |
| Business | Means companies using websites to increase efficiency and save money |
| Education | involves workplace training for businesses as well as learning for schools |
| VLEs | Services that provide virtual classrooms for students and teachers |
| SaaS | Software as a service lets you use applications online so you only pay for software on demand |
| Pay per click | A host of website (Facebook) displays ad for other companies (Adidas) If a visitor clicks the ad, they are sent to the advertisers site (Adidas.com) The host earns money for each visitor who clicks on the advert this process is called pay per click |
| Types of online Advertising | Sponsored links,banner ,pop up , email |
| Why companies choose to advertise online | Multimedia targeting and cookies links |
| How ads can be annoying | Personal privacy,not everyone is happy with use of cookies and history Adware, Type of malware that generates unwanted ads ,often as pop ups Auto-play video , some ads play as soon as the page loads Distraction ,ads can take up your attention from what your trying to do |
| Online software -v- Standalone software | standalone software is built on your PC,from a CD or downloaded key Advantage: it's on your hard -drive so runs fast and doesn't need internet Online software is accessed over the internet via your web browser Key advantage: you can access the software on all devices |
| Advantages to online software | Multimedia Automatic updates Pay monthly Save on Hardware |
| But there are risks | Reliability: if your online software service is unavailable, you can't access your files security: your online could be at risk from hackers wanting access |
| Online software | Levels of access File permissions version control |
| RFID chips | Can be read on multiple devices more reliable than bar codes |
| Server | A computer or computer program which manages access to a centralized resource or service in a network. |
| Client | A desktop computer or workstation that is capable of obtaining information and applications from a server. |
| Router | A small device that provides internet connection |
| Backbone | A backbone is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. |
| Network diagram | |
| Backbone diagram | |
| Dial up connections advantages | Advantage: can use existing telephone wires Gives connections where broadband is not available |
| Dial up connections disadvantages | Older tech can give poor receptions Can't use landline and internet at the same time |
| Broadband advantages | Better reception and speed than dial-up |
| Broadband Disadvantages | Wired, so has to be used on a stationary computer |
| Bandwidth speeds | |
| HTTP (Hypertext transfer protocol) | HTTP is a set of rules that handles what we do on the web. It handles your request to load a page on the web server. |
| HTTPS (Hypertext transfer protocol secure) | It is the more secure version of HTTPS it can be shown as a little padlock in the search bar. Protects privacy from 'hackers'. |
| FTP (File transfer protocol) | An old protocol that was invented even before the web was born. It is often used by web developers to transfer files to their server. |
| TCP (Transmission Control Protocol) | It specifies how data is exchanged by providing communications that identify how it should be broken into packets |
| IP (Internet protocol) | Internet Protocol address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. |
| Hyperlinks | A hyperlink is used to take you to a website ,document or a web page from another website once clicked |
| Browsers | A browser is a computer program with an interface for displaying HTML files, used to navigate to the World Wide Web. |
| Web servers | A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests. |
| URL | Uniform resource locator |
| Search engine diagram | A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web. |
| Client side | Client-side means that the action takes place on the user's (the client's) computer. Server-side means that the action takes place on a web server. ... For this reason, most things that can be accomplished using Java Script can be done without needing access to a web server. |
| Web crawler | A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index. The major search engines on the Web all have such a program, which is also known as a "spider" or a "bot." |
| Server side | Server-side means that the action takes place on a web server. |
| Index | An index is a method of sorting data by creating keywords or a listing of the data. A great example of an index of Computer Hope's hardware listing |
| Database | a structured set of data held in a computer, especially one that is accessible in various ways |
| Sponsored link results | Google sponsored links, another name for Google ads or Ad Words ads, are an option that Google offers to sites and businesses that want to pay a fee to appear in the search results for relevant search queries. ... These sponsored results differ from the organic Google results in that they're paid. |
| Adverts | an advertisement is something which shows a product to make you buy it |
| Popularity | Google sorts the websites by popularity |
| CC (Carbon copy) | When you want to send an email to multiple people you can send Carbon copies to other people |
| BCC (Blind carbon copy) | Its the exact same as CC but the people you send the Email to can't see the other people that the email has been sent to. |
| Address book/Contact group | A place where you can store all your contacts to make it easier to email. |
| Benefits of using Email | Sending speed If one person isn't online you can still send an email. |
| Drawbacks of using Email | Email could get stolen/hacked You need an internet connection to access your emails. You need to spell there Email 100% correctly |
| SMTP | Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another |
| IMAP | An IMAP client synchronizes the e-mail on your computer with the contents of your account on the e-mail server. IMAP synchronizes your computer with the email server. |
| POP 3 | POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. |
| Webmail | Webmail are web-based email accounts. ... Examples include Hotmail, G Mail and Yahoo Mail. Webmail allows the users to access their emails as long as they have access to an Internet connection and a web browser. This also means that the user cannot read an old email or draft a new email offline. |
| Email client | Email client is a desktop application that enables configuring one or more email addresses to receive, read, compose and send emails from that email address through the desktop interface. |
| description of packet switching | a mode of data transmission in which a message is broken into a number of parts which are sent independently, over whatever route is optimum for each packet, and reassembled at the destination. |
| Advantages of data switching | Efficient use of Network. Easily get around broken bits or packets. High Data Transmission in a Packet Switching is very easy. |
| Disadvantage of data switching | In Packet Switching Packets arriving in wrong order. Requires Large amount RAM (Random Access Memory) to handle large amount of data communication in packets. Switching Nods required more procession power to reconstruct packets. |
| What are codecs? | A codec is a device or computer program for encoding or decoding a digital data stream or signal. |
| Simplex with example | Signals go in one direction at a time. |
| Full duplex with example | Signals go in both directions at a time |
| Half duplex with example | Signals go in both directions but not at the same time. |
| Serial transmission description | Bits of data are transferred one at a time over a wire. |
| Parallel transmission description | Bits of data are transferred simultaneously a whole byte can be transferred at the same time. |
| Serial transmission benefit | Good over large distances. |
| Parallel transmission benefit | Faster because more bits transferred per second. |
| Serial transmission limitation | Complex because data has to be broken down into individual bits. |
| Parallel transmission | o |
| UTP (UnShielded Twisted Pair) | Twisted copper wires Used for LANs |
| STP(Shielded Twisted Pair) | Twisted copper wires Used for LANs |
| UTP (UnShielded Twisted Pair) Benefits | c |
| Infrared | Infrared is a very high frequency light that can transfer data . |
| Infrared: advantages | It is very reliable |
| Infrared: disadvantages | Short range. Devices must be in line of sight. Can suffer from interference |
| Bluetooth | Bluetooth uses waves with short wavelengths to transmit data. |
| Bluetooth: advantages | Good for medium distances. |
| Bluetooth: disadvantages | Can suffer from interference from other devices. e.g a microwave oven that's near a computer device |
| Satellite | Uses satellite in space to relay data between points on earth. e.g GPS |
| Satellite: Advantages | Good for very long distances |
| Satellite: disadvantages | Very expensive |
| Network Interface Card | It is a circuit board installed in a computer that provides a dedicated network connection to the computer. |
| Network Access Point (NAP) | A Network Access Point (NAP) was a public network exchange facility where Internet service providers (ISPs) connected with one another in peering arrangements. |
| Client side processing | Client-side is viewing a web page from a home device |
| Client side processing example | |
| Client side advantages | Faster on the client because data doesn't need to travel back to the serve across. Data can't be intercepted |
| Client side disadvantages | Browser-specific. different browsers process client scripts in different ways. |
| Server side processing | Server-side processing happens when a page is first requested and when pages are posted back to the server |
| Server side processing example | |
| Server side processing advantages | Servers are powerful computers No browser involved |
| Server side processing disadvantages | Security, when data is sent back through the internet there is a risk that it might get hacked |
| Database | A place where your date of birth, name, phone number etc. |
| Table | A table where information is held about someone or something |
| Field | the fields are the columns in the table e.g name , surname date of birth etc. |
| Record | A record is one row that stores data about a single item e.g student detail |
| Primary key | The primary key is a special field with a unique identifier e.g student ID |
| Foreign key | when your unique identifier appears in another table |
| Relationship | A relationship, in the context of databases, is a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table |
| Data types and uses |
Image:
Arrow (binary/octet-stream)
|
| Text | Any kind of characters, including letters and numbers. e.g: LA6 2HJ |
| Number | Numerical values, e.g:1.5 |
| Date/Time | Dates and times e.g 01/04/2014 e.g 13.30 |
| Boolean | One of two values, such as yes, no / true, false |
| Online Database | A database that can be accessed around the world |
| Local Database | A database inside a network to keep it secure |
| One feature of an online database | Shops, to keep a number of stock over a number of the same shops around the world. |
| One feature of an local database | it holds data internally within a business . e,g doctors/schools |
| DBMS | Allows you to create your own database |
| SQL | The language used by DBMS to search a database |
| tags | |
| HTML | Hypertext Markup Language, a standardized system for tagging text files to achieve font, colour, graphic, and hyperlink effects on World Wide Web pages. |
| E-voting | Voting via the internet |
| Freedom of information Act 2000 | Public authorities are obliged to Publish certain information if it's requested. Members of the public are entitled to request information from public authorities. |
| The copyright,designs and patents act | copyright gives the creators some types of media rights control how they're used and distributed. Music,books,videos and software can be covered by copyright law |
| 8 principles of the data protection act | |
| The Computer Misuse Act 1990 | Accessing computer material without permission (access without damage) accessing computer material without permission with intent to commit further crimes altering computer data without permission |
| The Computer Misuse Act 1990(Methods of access data) | Phishing- where you are asked for personnel data but it is a scam. Piggybacking-where hackers gain legal entry to a restricted site Pharming- when visiting a web site your a automatically direct you to a fake website |
| CCTV | cameras that track your movements |
| GPS devices | tracks your movements from space |
| Airport passenger lists | tracks who is on the fight |
| Monitoring email | monitoring you by accessing your email. |
| Monitoring websites visited | you can be monitored through the web |
Want to create your own Flashcards for free with GoConqr? Learn more.