BTECH 7-12

Mind Map by , created over 5 years ago

Mind Map on BTECH 7-12, created by parsonagej10 on 06/23/2014.

Tags No tags specified
Created by parsonagej10 over 5 years ago
Cloud Data Integration Specialist Certification
James McLean
English spelling rules
Sarah Holmes
DEV I Part I
d owen
Repaso Revalida PR 2016
Rodrigo Lopez
1PR101 2.test - Část 6.
Nikola Truong
Biology- Genes, Chromosomes and DNA
Laura Perry
History- Home Front WW1
Physics GCSE AQA Unit 1 quiz
A Level Chemistry Unit 1 - Organic Chemistry
BTECH 7-12
1.1 WWW
1.1.1 Tim Berners Lee -1991
1.1.2 consists of millions of web pages linked together and content that appears on them
1.1.3 subset of the internet; consists of web pages that can be accessed using a web browser. Internet is network where all info sits
1.2 HTML
1.2.1 hypertext markup language
1.2.2 HTML Tags normally in pairs - operating tag (<body>) and end tag (/). content between pairs is HTML element e.g. <html> - opening tag for program </body> - end tag for section
1.3 URL
1.3.1 Uniform Resource Locator
2.1 Store & forward
2.1.1 sender & recipient don't have to be online at same time. sender sends message , it's stored on an email server and waits there until recipient signs in, when server forwards message to them.
2.2 Fields
2.2.1 To field- where you enter email address
2.2.2 Cc field (Carbon copy) - recipients entered are visible to everyone
2.2.3 Bcc field (Blind Carbon Copy) - recipient isn't visible to everyone
2.3 E-mail
2.3.1 speed of delivery, cost, instant, multiple recipients, attachments
2.3.2 privacy & security, internet access, lack of interactivity
2.4 Protocols
2.4.1 SMTP - Simple Mail transfer protocol used to send messages across networks in server-to-sever transfers.
2.4.2 POP3 - Post Office Protocol 3 used to retrieve emails from email server over TCP connection.
2.4.3 IMAP - Instant Message Access Protocol another email retrieval protocol
3.1.1 device/ program used to encode/decode data.
3.2 Transmission modes
3.2.1 Simplex sends data in one direction only e.g. computer to printer
3.2.2 Half Duplex two-way transmissions but not at the same time e.g. walkie talkies
3.2.3 Duplex two-way communication at the same time e.g. telephone system
3.3 Transmission methods
3.3.1 wired UTP/STP e.g. analogue telephone network twisting cancels out interference, low cost and adaptable slower with less capacity than other cables, short distances, susceptible to noise Coaxial e.g. aerial/dish connection to TV fast and reliable costs more than UTP/STP, susceptible to noise Fibre Optic fasts, works over long distance, little interference complex equipment needed
3.3.2 wireless Infrared reliable short range, devices must be in direct line of sight, can suffer external interference Microwave signal degrades little over long distances devices must be in direct line of sight, can be affected by sun, rain, pollen and external interference Satellite can increase distance a network can reach expensive
4.1 transmissions
4.1.1 simple bits transmitted one at a time over single wire/ channel. reduces cost, but slower rate of data transfer. bytes have to be diassembled and reassembled before/ after transmission. can be used over large distances
4.1.2 Parallel number of bits of data can be transmitted at the same time over equal no. of wires/ channels, Allows bits in whole byte of info to be transmitted together. short range (max. 5m)
4.1.3 bi-directional transmitting in both directions. Light passes in 1 direction only, so you have to add extra fibres to the bundle to carry a signal in the opposite direction
4.2 client side processing
4.2.1 when he interaction between a web page and code occurs directly on a user's computer speed, security it's browser specific, computer speed
4.3 server side processing
4.3.1 when the interaction between a web page and a computer is processed through a server efficiency, browser independant, speed security, overloading
4.4 USB
4.4.1 Universal serial bus - higher speed serial connection standard that supports low and higher speed devices
5.1 key points
5.1.1 malware hostile, intrusive or annoying piece of software or program code
5.1.2 threats to data oppurtunist people find unattended computer which is logged on and view, steal or damage info, programs or hardware virus small programs which replicate and spread between computers. NOT beneficial - make some changes to the system and are undesirable. attach themselves to files/ emails trojan phishing attempts to gain access to passwords, financial details and other privileged info. done by emails pretending to come from trusted websites etc. try to divert you to a website which looks original and asks for info about you
5.1.3 accidental damage can be caused by natural disasters e.g. flooding, mischief or accidental mishap. can result in losing all of a computer's data
5.2 attack consequences
5.2.1 organisations' reputation damaged - puts customers off, lose money
5.2.2 organisation's secrets spread to competitors - don;t have advantage anymore
5.2.3 identity theft
5.2.4 disclosure of info could cause legal problems - companies can be sued
5.3 preventative actions
5.3.1 physical barrier e.g turn of computer, lock office
5.3.2 Password sequence of characters which allow access to computers, networks or applications
5.3.3 access levels allow individuals to have access only to specific levels of application
5.3.4 anti-virus software intercept computer viruses before they become resident
5.3.5 firewall software which monitors all data arriving - stops anything that is harmful
5.3.6 encryption codifies data so can't be read by people who don;t have key to code.
6.1 data storage
6.1.1 holding data on a computer system
6.2 database structure
6.2.1 Table or grid - data about a particular thing
6.2.2 Record row - holds info about a single item
6.2.3 fields or column - holds info about properties of items
6.2.4 data type Text Number date/ time logical currency
6.3 relationships
6.3.2 primary key unique record that identifies each individual record
6.3.3 Foreign Key keyfield from another table within the table to link them together

Media attachments