Lets Communicate Mindmap

Description

A Mind Map Containing All The Information About The Lets Communicate Chapter Of The E-Book
Jacaletto
Mind Map by Jacaletto , updated more than 1 year ago
Jacaletto
Created by Jacaletto over 9 years ago
64
0

Resource summary

Lets Communicate Mindmap
  1. Chapter 1.1 - What Can Your Phone Do?
    1. Smart Phones
      1. Mobile phones were originally developed to make and receive calls, but they have now developed into smart phones.
        1. These can be used for purposes that were never imagined when they were first launched, such as taking pictures or using the Internet.
          1. A smart phone is an example of a multifunctional device.
          2. Choosing A Mobile Phone
            1. Picture resolution – refers to the quality and detail that can be shown on the screen of the mobile. The higher the resolution, the better the quality of the image displayed on-screen. This is measured in pixels.
              1. Camera resolution – the amount of detail that the camera picks up in one picture. The higher the resolution, the more detail the camera picks up, but this means that the picture _ les can be very big. The resolution is measured in mega-pixels (MP).
                1. Storage capacity – the amount of space the phone has in its internal memory to store applications, pictures, sounds, videos, etc. This is measured in gigabytes (GB).
                  1. Memory card – a secondary storage device that allows users to store, back up, copy and remove their _ les. Users can choose an appropriate card size according to what they are using them for. Different devices have different size and shape memory cards. SD or SDHC cards are commonly used, but there are others.
                  2. Safety
                    1. When making a phone call, if you do not want the other person to see your number you can withhold it.
                      1. For your own security you can have a lock set up on the phone to prevent unauthorised access.
                        1. If you register your phone and it gets stolen, you can report it to your network provider.
                          1. They can block the phone, making it unusable.
                          2. Connectivity
                            1. To connect to the Internet or share information with other phones, mobile phones need to be able to send and receive signals.
                              1. As the phone is a ‘mobile’ device, it needs to be able to connect wirelessly.
                                1. The most common ways of connecting devices (e.g. phones, routers, and computers) to each other are Bluetooth and Wi-Fi.
                              2. Chapter 1.2 - Designing A Mobile Phone
                                1. Chapter 1.3 - Mobile Phones For Everyone
                                  1. Chapter 1.4 - What Kind Of computer
                                    1. Chapter 1.5 - Socialising On The Internet
                                      1. Chapter 1.6 - The Internet As A Work Tool
                                        1. Email
                                          1. This is a popular method of communication.
                                            1. It involves sending messages over a communications network, such as the Internet, between computers and other devices.
                                              1. Email is a popular way of communicating in school.
                                                1. Worldwide email traf c totalled 247 billion messages per day in 2009 with this number set to increase to 507 billion per day in 2013.
                                                  1. Emails are now commonly accessible using mobile phones, laptops and other devices using wireless dongles which use 3G mobile network.
                                                    1. This allows users to connect to the Internet without being close to a wireless router as it uses the mobile network.
                                                    2. Protocols
                                                      1. There are two types of common protocol used by email services providers: IMAP4 andPOP3.
                                                      2. Chapter 1.7 - Internet Safety
                                                        1. Dangers
                                                          1. Virus
                                                            1. Viruses are programs that can infect a computer without the permission or knowledge of the user.
                                                              1. They can damage the system’s settings and memory, generating error messages and causing the computer to malfunction.
                                                                1. Viruses can get on to your computer through: visiting certain websites, opening emails, downloading attachments or content from the Internet, using infected portable storage devices such as memory sticks, CDs, DVDs, connecting to an infected hard disk.
                                                                2. Spyware
                                                                  1. Spyware is a computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program.
                                                                    1. It works by collecting information and sending it back to another source.
                                                                      1. The information collected could include the websites you have been visiting or what you have been downloading.
                                                                        1. This information is often used for marketing purposes, but can also be used for illegal purposes such as fraud.
                                                                        2. Cookies
                                                                          1. A cookie is a small file which stores information related to your Internet activity and then reports this back to the website server.
                                                                            1. Cookies are used legitimately by website creators to enable websites to be customised for individual users.
                                                                              1. However, cookies can cause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.
                                                                              2. Spam
                                                                                1. Spam is all unwanted email such as unsolicited commercial email, unsolicited bulk email and chain letters.
                                                                                2. Phishing
                                                                                  1. Phishing involves sending a link via an email to a website which looks like a genuine website (e.g. a bank website) but is in fact bogus.
                                                                                    1. The recipient may be tricked into following the link and entering details such as bank passwords or personal information on the website.
                                                                                    2. Hackers
                                                                                      1. It is important to keep the information that is stored on your computer secure.
                                                                                        1. Hackers are people who try to get access to your computer without your permission in order to steal information which they could use for malicious or criminal purposes.
                                                                                        2. Identity Theft
                                                                                          1. This takes place when someone collects personal information about you and uses that information for malicious or criminal purposes.
                                                                                            1. In the past, criminals used to rummage though bins to get information, but now people can access Internet social networking sites where people’s profi les contain personal information, which could prove valuable to the criminals.
                                                                                        3. Chapter 1.8 - Digital Divide
                                                                                          1. Digital Divide
                                                                                            1. This is the gap between people in society who cannot or do not have effective access to digital technology and those who do.
                                                                                              1. Because of the importance of technology in modern life, people who do not have access to it can be disadvantaged in many ways.
                                                                                                1. Households with access to the Internet are far more likely to use other types of digital equipment, such as digital cameras, MP3 players and mobile phones.
                                                                                                2. Econimic
                                                                                                  1. Economics is to do with money, wealth, jobs, production, distribution and consumption of goods and services.
                                                                                                    1. People with knowledge of technology and the skills to use it can get better-paid jobs.
                                                                                                      1. Online banking allows people to use the facilities of a bank in the comfort of their own homes.
                                                                                                        1. The Internet gives people access to a wider range of products and services.
                                                                                                          1. The Internet allows people to research products and get cheaper deals for goods and services.
                                                                                                            1. Less well off people may not be able to afford the initial set up costs of ICT systems resulting in them being unable certain services.
                                                                                                              1. People may feel pressure to purchase equipment and ICT systems that they cannot afford, resulting in debt.
                                                                                                                1. The Internet has led to a rise in e-commerce and globalisation.
                                                                                                                  1. Countries with less ICT infrastructure may be unable to make the most of globalisation, and fall further behind at a greater rate.
                                                                                                                  2. Educational
                                                                                                                    1. This is about learning and the knowledge gained from learning.
                                                                                                                      1. Students who use computers at home or school can become independent learners and excel in education.
                                                                                                                        1. Most schools are moving to personalised learning using VLEs. Without Internet access, young people cannot bene t from this.
                                                                                                                          1. Having access to online educational resources allows students to do better work.
                                                                                                                            1. People can take part in online courses to gain further skills and qualifications, no matter where they are in the world.
                                                                                                                              1. A gap in ICT skills may exclude people from particular jobs.
                                                                                                                              2. Social
                                                                                                                                1. This is about human society and the people who live in it.
                                                                                                                                  1. People can feel left out if they do not have technological goods and services.
                                                                                                                                    1. Not having access to communications such as email, IM and mobile phones can affect people’s social interactions.
                                                                                                                                    2. Cultural
                                                                                                                                      1. This refers to the behaviour, attitudes and lifestyles of a particular social group.
                                                                                                                                        1. Many cafés now offer facilities such as the Internet to attract customers.
                                                                                                                                          1. Many people carry around MP3/4 players, mobile phones and other digital devices.
                                                                                                                                            1. People can watch video on demand and catch up on TV that they have missed.
                                                                                                                                              1. More children stay indoors and play on games consoles instead of playing outside.
                                                                                                                                                1. Cultural and/or religious influences might dissuade some groups of people from using ICT which could lead to lack of access, lack of education and an inability for countries to participate in globalisation.
                                                                                                                                                2. Government Initiative
                                                                                                                                                  1. The government recognises that there are people who do not have up-to- date technology, such as digital TV, computers and the Internet.
                                                                                                                                                    1. There are government schemes to help people who cannot afford them.
                                                                                                                                                    2. Constant Change
                                                                                                                                                      1. The fast pace of advances in technology widens the digital divide.
                                                                                                                                                        1. Because of the cost of new technology, many people are unable to keep up to date.
                                                                                                                                                          1. This also causes issues of compatibility; for example, an old computer may not have the specification needed to run new software or hardware.
                                                                                                                                                            1. The digital divide is not just a UK problem, it affects the whole world.
                                                                                                                                                          Show full summary Hide full summary

                                                                                                                                                          Similar

                                                                                                                                                          Types and Components of Computer Systems
                                                                                                                                                          Jess Peason
                                                                                                                                                          Input Devices
                                                                                                                                                          Jess Peason
                                                                                                                                                          Output Devices
                                                                                                                                                          Jess Peason
                                                                                                                                                          Networks
                                                                                                                                                          Will8324
                                                                                                                                                          General ICT Quiz
                                                                                                                                                          leahshaw
                                                                                                                                                          ICT Revison Flash Cards
                                                                                                                                                          Arun Johal
                                                                                                                                                          FLAT FILE VS RELATIONAL DATABASE
                                                                                                                                                          rosiejones
                                                                                                                                                          Online World - Learning Aim A
                                                                                                                                                          andysedge
                                                                                                                                                          Business Aims and ICT Strategies
                                                                                                                                                          scrt
                                                                                                                                                          User Interfaces
                                                                                                                                                          Skeletor
                                                                                                                                                          General ICT Quiz
                                                                                                                                                          Jade Fantom