Unit 1 The Online World Revision Mindmap

10longtonc
Mind Map by , created over 5 years ago

Mind Map on Unit 1 The Online World Revision Mindmap, created by 10longtonc on 04/25/2014.

2672
4
1
Tags No tags specified
10longtonc
Created by 10longtonc over 5 years ago
An Inspector Calls - Inspector Goole
Rattan Bhorjee
GCSE Biology B1 (OCR)
Usman Rauf
Macbeth Quotes/Themes
Michael LEwis
GENERAL PRACTICE-1
Luis Felipe Chávez Choque
Sociology GCSE AQA - Studying Society keywords
tasniask
CHEMISTRY C1 3
x_clairey_x
B7: Further Biology
Matthew Law
Conceptos Generales De Robótica
fede ramos
Main People in Medicine Through Time
Holly Bamford
Unit 1 The Online World Revision Mindmap
1 Learning Aim A Online Services and Communication
1.1 Ubiqitous Computing
1.1.1 RFID
1.2 Online Services
1.2.1 Real Time
1.2.2 Communication
1.2.3 Govermental
1.2.4 Entertainment
1.2.5 Eduacational
1.3 Cloud Computing
1.3.1 Online Storage
1.4 Online Advertising
1.4.1 Benefits and Drawbacks
1.4.2 Pay Per Click and Affiliates
1.4.3 Banners
1.4.4 Email Marketing
1.5 Online Documents
1.5.1 Compressing Files
1.5.2 How It Works
1.5.3 Benefits and Drawbacks
2 Learning Aim B Components of the Internet
2.1 The Internet
2.1.1 Email
2.1.1.1 Benefits and Drawbacks
2.1.1.2 Adress Book, CC, BCC, etc
2.1.2 Internet Connection Methods
2.1.2.1 Wireless
2.1.2.2 Broadband
2.1.2.2.1 Bandwidth and Transmission Rate
2.1.2.3 Dial Up
2.1.3 Internet Infrastructure
2.1.3.1 Server
2.1.3.2 Client
2.1.3.3 Router
2.1.3.4 Internet Key Terms
2.1.4 World Wide Web
2.1.4.1 HTML
2.1.4.2 ISP
2.1.4.3 Serch Engines
2.1.4.4 URL's
2.2 Data Storage
2.2.1 Online Database
2.2.2 DBMS
2.2.3 Database Storage
2.2.4 Relationships
2.2.5 Data Types
2.3 Data Exchange
2.3.1 VOIP
2.3.2 Transmission Methods
2.3.3 Transmission Modes
3 Learning Aim C Issues with Operating Online
3.1 Type of threats to data
3.1.1 Viruses
3.1.2 Accidental Damage
3.1.3 Oppertunist Threats
3.1.4 Malware
3.1.5 Phishing
3.2 The Importance the Security
3.3 Personal Safety
3.3.1 Identity Theft
3.4 Preventative and Remedial Actions
3.4.1 Password Control
3.4.2 Physical Barriers
3.4.3 Access Levels
3.4.4 Anti Virus Software
3.4.5 Firewalls
3.4.6 Encryption
3.4.7 Back Up and Recovery

Media attachments