BTECH 7-12

parsonagej10
Mind Map by , created over 5 years ago

Mind Map on BTECH 7-12, created by parsonagej10 on 06/23/2014.

40
3
0
Tags No tags specified
parsonagej10
Created by parsonagej10 over 5 years ago
Cloud Data Integration Specialist Certification
James McLean
English spelling rules
Sarah Holmes
DEV I Part I
d owen
Repaso Revalida PR 2016
Rodrigo Lopez
1PR101 2.test - Část 6.
Nikola Truong
Biology- Genes, Chromosomes and DNA
Laura Perry
History- Home Front WW1
jessmitchell
Physics GCSE AQA Unit 1 quiz
Adorkable_dreamer
A Level Chemistry Unit 1 - Organic Chemistry
charlottehyde
Maths
xcathyx99
BTECH 7-12
1 LESSON 7
1.1 WWW
1.1.1 Tim Berners Lee -1991
1.1.2 consists of millions of web pages linked together and content that appears on them
1.1.3 subset of the internet; consists of web pages that can be accessed using a web browser. Internet is network where all info sits
1.2 HTML
1.2.1 hypertext markup language
1.2.2 HTML Tags
1.2.2.1 normally in pairs - operating tag (<body>) and end tag (/). content between pairs is HTML element
1.2.2.2 e.g. <html> - opening tag for program </body> - end tag for section
1.3 URL
1.3.1 Uniform Resource Locator
2 LESSON 8
2.1 Store & forward
2.1.1 sender & recipient don't have to be online at same time. sender sends message , it's stored on an email server and waits there until recipient signs in, when server forwards message to them.
2.2 Fields
2.2.1 To field- where you enter email address
2.2.2 Cc field (Carbon copy) - recipients entered are visible to everyone
2.2.3 Bcc field (Blind Carbon Copy) - recipient isn't visible to everyone
2.3 E-mail
2.3.1 speed of delivery, cost, instant, multiple recipients, attachments
2.3.2 privacy & security, internet access, lack of interactivity
2.4 Protocols
2.4.1 SMTP - Simple Mail transfer protocol
2.4.1.1 used to send messages across networks in server-to-sever transfers.
2.4.2 POP3 - Post Office Protocol 3
2.4.2.1 used to retrieve emails from email server over TCP connection.
2.4.3 IMAP - Instant Message Access Protocol
2.4.3.1 another email retrieval protocol
3 LESSON 9
3.1 CODEC
3.1.1 device/ program used to encode/decode data.
3.2 Transmission modes
3.2.1 Simplex
3.2.1.1 sends data in one direction only e.g. computer to printer
3.2.2 Half Duplex
3.2.2.1 two-way transmissions but not at the same time e.g. walkie talkies
3.2.3 Duplex
3.2.3.1 two-way communication at the same time e.g. telephone system
3.3 Transmission methods
3.3.1 wired
3.3.1.1 UTP/STP e.g. analogue telephone network
3.3.1.1.1 twisting cancels out interference, low cost and adaptable
3.3.1.1.2 slower with less capacity than other cables, short distances, susceptible to noise
3.3.1.2 Coaxial e.g. aerial/dish connection to TV
3.3.1.2.1 fast and reliable
3.3.1.2.2 costs more than UTP/STP, susceptible to noise
3.3.1.3 Fibre Optic
3.3.1.3.1 fasts, works over long distance, little interference
3.3.1.3.2 complex equipment needed
3.3.2 wireless
3.3.2.1 Infrared
3.3.2.1.1 reliable
3.3.2.1.2 short range, devices must be in direct line of sight, can suffer external interference
3.3.2.2 Microwave
3.3.2.2.1 signal degrades little over long distances
3.3.2.2.2 devices must be in direct line of sight, can be affected by sun, rain, pollen and external interference
3.3.2.3 Satellite
3.3.2.3.1 can increase distance a network can reach
3.3.2.3.2 expensive
4 LESSON 10
4.1 transmissions
4.1.1 simple
4.1.1.1 bits transmitted one at a time over single wire/ channel. reduces cost, but slower rate of data transfer. bytes have to be diassembled and reassembled before/ after transmission. can be used over large distances
4.1.2 Parallel
4.1.2.1 number of bits of data can be transmitted at the same time over equal no. of wires/ channels, Allows bits in whole byte of info to be transmitted together. short range (max. 5m)
4.1.3 bi-directional
4.1.3.1 transmitting in both directions. Light passes in 1 direction only, so you have to add extra fibres to the bundle to carry a signal in the opposite direction
4.2 client side processing
4.2.1 when he interaction between a web page and code occurs directly on a user's computer
4.2.1.1 speed, security
4.2.1.2 it's browser specific, computer speed
4.3 server side processing
4.3.1 when the interaction between a web page and a computer is processed through a server
4.3.1.1 efficiency, browser independant, speed
4.3.1.2 security, overloading
4.4 USB
4.4.1 Universal serial bus - higher speed serial connection standard that supports low and higher speed devices
5 LESSON 12
5.1 key points
5.1.1 malware
5.1.1.1 hostile, intrusive or annoying piece of software or program code
5.1.2 threats to data
5.1.2.1 oppurtunist
5.1.2.1.1 people find unattended computer which is logged on and view, steal or damage info, programs or hardware
5.1.2.2 virus
5.1.2.2.1 small programs which replicate and spread between computers. NOT beneficial - make some changes to the system and are undesirable. attach themselves to files/ emails
5.1.2.3 trojan
5.1.2.4 phishing
5.1.2.4.1 attempts to gain access to passwords, financial details and other privileged info. done by emails pretending to come from trusted websites etc. try to divert you to a website which looks original and asks for info about you
5.1.3 accidental damage
5.1.3.1 can be caused by natural disasters e.g. flooding, mischief or accidental mishap. can result in losing all of a computer's data
5.2 attack consequences
5.2.1 organisations' reputation damaged - puts customers off, lose money
5.2.2 organisation's secrets spread to competitors - don;t have advantage anymore
5.2.3 identity theft
5.2.4 disclosure of info could cause legal problems - companies can be sued
5.3 preventative actions
5.3.1 physical barrier
5.3.1.1 e.g turn of computer, lock office
5.3.2 Password
5.3.2.1 sequence of characters which allow access to computers, networks or applications
5.3.3 access levels
5.3.3.1 allow individuals to have access only to specific levels of application
5.3.4 anti-virus software
5.3.4.1 intercept computer viruses before they become resident
5.3.5 firewall
5.3.5.1 software which monitors all data arriving - stops anything that is harmful
5.3.6 encryption
5.3.6.1 codifies data so can't be read by people who don;t have key to code.
6 LESSON 11
6.1 data storage
6.1.1 holding data on a computer system
6.2 database structure
6.2.1 Table
6.2.1.1 or grid - data about a particular thing
6.2.2 Record
6.2.2.1 row - holds info about a single item
6.2.3 fields
6.2.3.1 or column - holds info about properties of items
6.2.4 data type
6.2.4.1 Text
6.2.4.2 Number
6.2.4.3 date/ time
6.2.4.4 logical
6.2.4.5 currency
6.3 relationships
6.3.1 can be ONE-TO-ONE, ONE-TO-MANY, or MANY-TO-MANY
6.3.2 primary key
6.3.2.1 unique record that identifies each individual record
6.3.3 Foreign Key
6.3.3.1 keyfield from another table within the table to link them together

Media attachments