Unit 1: The Online World Revision Mindmap

10whiteheadh
Mind Map by , created over 5 years ago

Mind Map on Unit 1: The Online World Revision Mindmap, created by 10whiteheadh on 04/25/2014.

355
2
0
Tags No tags specified
10whiteheadh
Created by 10whiteheadh over 5 years ago
The Biological basis of Heart Disease
Andrea Leyden
GCSE AQA Biology 1 Cloning & Genetic Engineering
Lilac Potato
A View from the Bridge
Mrs Peacock
Système circulatoire sanguin
Martin Fortier
Účto Fífa 2/6
Bára Drahošová
Biology : Basic Terms
Paul Fisher
General Knowledge Quiz
PatrickNoonan
Unit 1 Sociology: Family Types
ArcticCourtney
Spanish: Grammar 3.2
Selam H
Principles of basic electrical circuits
brightsparky79
Unit 1: The Online World Revision Mindmap
1 Learning Aim A: Online Services and Communication
1.1 Online services
1.1.1 Communication
1.1.1.1 Provides the ability to communicate with others. Could be via a website, imessage or app
1.1.2 Entertainment
1.1.2.1 Website designed for entertainment purposes e.g. TV catchup
1.1.3 Educational / VLE (Virtual Learning Environment)
1.1.3.1 Ability to learn online e.g. Moodle
1.1.4 Governmental
1.1.4.1 Allows you to access opportunities like online tax returns etc.
1.1.5 Real time Information
1.1.5.1 Provides the ability to access information as it happens. Could be through an app, website or electric signage
1.1.6 Commerce
1.1.6.1 More related to money than others. Ability to purchase items, check bank balance etc.
1.1.7 Download
1.1.7.1 Allows you to download apps, music, videos etc.
1.1.8 Business
1.1.8.1 Communicate with colleagues or complete work from home
1.2 Online Advertising
1.2.1 Pay Per Click
1.2.1.1 Advertisers pay publishers when the ad is clicked
1.2.2 Affiliate Model
1.2.2.1 Website about a certain topic promotes other websites related to the same topic
1.2.3 Banners
1.2.3.1 A picture or text at the top of a website promoting a business or product
1.2.4 Email Marketing
1.2.4.1 Marketing commercial messages to groups of people using their email
1.2.5 Benefits
1.2.5.1 Targeted audience
1.2.5.2 A good way of branding
1.2.5.3 Trackable e.g. measure number of clicks
1.2.5.4 Cost effective
1.2.6 Drawbacks
1.2.6.1 Can be irritating
1.2.6.2 People might delete it without reading it
1.2.6.3 Not everyone uses the Internet
1.2.6.4 Internet frauds e.g. credit card details can be stolen when a purchase is made
1.2.6.5 Slows down the webpage
1.3 Online Documents
1.3.1 Compressing Files
1.3.1.1 Used to reduce the size of files
1.3.2 How it works
1.3.2.1 Documents are stored online and can be edited and shred with people by inserting their email address. The document is sent with a secure link to the one document (no extras made). Collaborators can edit and save the document e.g. once the document is edited by someone else you can see the changes immediately i.e. no confusion with updates or different versions
1.3.3 Benefits
1.3.3.1 It is free
1.3.3.2 No more confusion with numerous copies
1.3.3.3 Different types of documents are able to be stored e.g. presentations
1.3.3.4 Secure
1.3.3.5 Immediate availability
1.3.4 Drawbacks
1.3.4.1 Can be time consuming
1.3.4.2 Difficulties determining authenticity and reliabiltiy
1.3.4.3 Can be low quality
1.4 Ubiquitous Computing
1.4.1 An advanced computing concept where computing is made to appear everywhere and anywhere
1.4.2 RFID (Radio Frequency Identification)
1.4.2.1 A technology used in Ubiquitous Computing. It is a chip implanted into an object which can be used for tracking
1.5 Cloud Computing
1.5.1 Online Storage
1.5.1.1 Practice of storing data with a third party service through the Internet
1.5.2 Storing, managing and processing data online rather than on a local server or personal computer
2 Learning Aim B: Components of the Internet
2.1 The Internet (Interconnected Networks)
2.1.1 Internet Infrastructure
2.1.1.1 Client
2.1.1.1.1 A computer/workstation that is capable of obtaining information/applications from a server
2.1.1.2 Server
2.1.1.2.1 A computer program that provides services to other computers
2.1.1.3 Router
2.1.1.3.1 A small device that joins multiple networks together
2.1.1.4 Internet Key Terms
2.1.1.4.1 The Internet
2.1.1.4.1.1 A global computer network providing a variety of information and communication facilities consisting of interconnected networks
2.1.1.4.2 WWW (World Wide Web)
2.1.1.4.2.1 An information system on the Internet which allows documents to be connected by hyperlinks enabling the user to search for information
2.1.1.4.3 IP (Internet Protocol)
2.1.1.4.3.1 A set of rules governing the format of data sent over the Internet
2.1.1.4.4 TCP (Transmission Control Protocol)
2.1.1.4.4.1 A protocol developed for the Internet to get data from one network device to another
2.1.1.4.5 FTP (File Transfer Protocol)
2.1.1.4.5.1 Protocol that allows users to copy files between their local system and any system they can reach on the network
2.1.1.4.6 ISP (Internet Service Provider)
2.1.1.4.6.1 A business/organization that offers users access to the internet and related services
2.1.1.4.7 POP (Point Of Presence)
2.1.1.4.7.1 The point at which 2 or more different networks or communication devices build a connection with each other
2.1.1.4.8 NAP (Network Access Point)
2.1.1.4.8.1 Public network exchange facility where ISP's connected with one other in peering arrangements
2.1.1.5 Connecting Backbone
2.1.1.5.1 The principal data routes between large, strategically interconnected networks and core routers on the internet
2.1.2 World Wide Web
2.1.2.1 URL's (Uniform Resource Locator)
2.1.2.1.1 The address of a certain website on the Internet.
2.1.2.1.2 Features: no spaces or other characters and uses forward slashes to indicate different directories
2.1.2.2 Search Engines
2.1.2.2.1 A website used to search for other websites
2.1.2.3 ISP (Internet Service Provider)
2.1.2.3.1 A business/organisation that offers users access to the Internet
2.1.2.4 HTML (Hyper Text Mark-up Language)
2.1.2.4.1 A system for tagging files to achieve effects on World Wide Web pages
2.1.2.5 Web Browser
2.1.2.5.1 A package used to access the Internet
2.1.3 Internet Connection Methods
2.1.3.1 Dial Up
2.1.3.1.1 Using a modem to connect to the Internet. The modem connects to the computer and standard phone lines which serve as the data transfer medium
2.1.3.2 Broadband
2.1.3.2.1 Bandwidth
2.1.3.2.1.1 A range of frequencies within a given band that is used for transmitting a signal
2.1.3.2.2 Transmission Rate
2.1.3.2.2.1 The speed at which a network device communicates within the network
2.1.3.3 Wireless
2.1.3.3.1 Using radio, microwaves etc. (as oppose to wires and wires) to transmit signals
2.1.4 Email
2.1.4.1 Features
2.1.4.1.1 CC (Carbon Copy)
2.1.4.1.1.1 An address typed into the CC line in an email means they will receive a copy of the email you're sending
2.1.4.1.2 BCC (Blind Carbon Copy)
2.1.4.1.2.1 A copy of an email sent to a recipient whose email address doesn't appear in the message
2.1.4.1.3 Address Book
2.1.4.1.3.1 A database that stores email addresses of people who you have emailed
2.1.4.1.4 Attachments
2.1.4.1.4.1 A file attached to an email
2.1.4.1.5 Priorities
2.1.4.1.5.1 You can assign a priority to an email
2.1.4.2 Benefits
2.1.4.2.1 Delivered extremely fast compared to traditional post
2.1.4.2.2 Can be sent 24/7
2.1.4.2.3 Emails can be sent and received from any computer in the world with Internet access
2.1.4.2.4 Cheaper than sending a letter
2.1.4.2.5 Emails can be sent to one person or several
2.1.4.3 Drawbacks
2.1.4.3.1 Recipient needs Internet access to receive the email
2.1.4.3.2 Viruses are easily spread through attachments
2.1.4.3.3 Phising
2.1.4.3.4 Spam
2.1.4.3.5 Email won't be read until the receiver has logged on
2.2 Data Exchange
2.2.1 VOIP (Voice Over Internet Protocol)
2.2.2 Transmission Methods
2.2.2.1 UTP (Unshielded Twisted Pair) /STP (Shielded Twisted Pair)
2.2.2.1.1 UTP cables are basic pairs of cables twisted together. STP cables are similar but have a foil shielding
2.2.2.2 Coaxial
2.2.2.2.1 A solid wire core separated from a copper-braided outer cable by a plastic sheath. The inner cable transmits the data and the outer cable connects to earth.
2.2.2.3 FibreOptic
2.2.2.3.1 Light is used to carry data and information which is passed down cables. The cable is made of glass and thinner than a human hair which makes it flexible and strong.
2.2.2.4 Infrared
2.2.2.4.1 Short range data transmissions using infrared light.
2.2.2.5 Microwave
2.2.2.5.1 Short wavelength radio transmissions working at high frequencies
2.2.2.6 Satellite
2.2.2.6.1 Data is transmitted to Earth from a satellite, which relays it to the relevant receiving station on Earth
2.2.3 Transmission Modes
2.2.3.1 Simplex
2.2.3.1.1 Data is only transferred in one direction e.g. Radio Broadcasting
2.2.3.2 Half Duplex
2.2.3.2.1 Data is transferred in 2 directions but one at a time. e.g. Walkie Talkies
2.2.3.3 Duplex (sometimes Full Duplex)
2.2.3.3.1 Data is transferred in 2 directions simultaneously e.g. Telephone Conversation
2.2.3.4 Serial Transmission
2.2.3.4.1 Bits are transmitted one at a time over a single channel. Reduces cost of cable but makes transmission slower.
2.2.3.5 Parallel Transmission
2.2.3.5.1 A number of bits are transmitted simultaneously over an equal number of channels
2.2.3.6 Client Side Processing
2.2.3.6.1 Operations performed by the client in a client-server relationship in a computer network
2.2.3.7 Server Side Processing
2.2.3.7.1 Operations performed by the server in a client-server relationship in a computer network
2.3 Data Storage
2.3.1 Online Databases
2.3.1.1 A database accessible from a network e.g. the Internet as appose to one held on attachable storage e.g. a CD
2.3.2 DBMS (Database Management Systems)
2.3.2.1 Software that handles the storage, retrieval and updating of data in a computer system
2.3.3 Relationships
2.3.3.1 A situation that exits between 2 relational database tables when 1 table has a foreign key that references the primary key of other tables
2.3.4 Data Types
2.3.4.1 A particular kind of data item defined by the values it can take, programming language used, or operations that can be performed on it
2.3.5 Database Structure
2.3.5.1 A set of approaches for organising large collections of computer files commonly relating to a single subject
3 Learning Aim C: Issues with Opperating Online
3.1 Type of Threats to Data
3.1.1 Phising
3.1.1.1 The practice of sending emails to people pretending to be a reputable company attempting to get hold of personal details e.g. credit card details
3.1.2 Malware (Malicious Software)
3.1.2.1 A piece of software specifically designed to disrupt or damage a computer system e.g. a virus
3.1.3 Opportunist Threats
3.1.3.1 When a computer is still logged on people take the opportunity to search for personal information e.g.passwords
3.1.4 Accidental Damage
3.1.4.1 Damage is done to your device accidentally e.g. water spills
3.1.5 Viruses
3.1.5.1 A piece of code able to copy itself which has a harmful effect on your device e.g. corrupt systems, destroying data
3.2 Personal Safety
3.2.1 Identity Theft
3.2.1.1 The fraudulent practice of using another persons personal information to obtain credit card details etc.
3.3 The Importance of Security
3.3.1 It is important to protect your data so you don't lose valuable and sometimes irreplaceable information/files
3.4 Preventative and Remedial Actions
3.4.1 Firewalls
3.4.1.1 A system designed to prevent unauthorised access to or from a private network
3.4.2 Encryption
3.4.2.1 The translation of data into a secret code
3.4.3 Back Up and Recovery
3.4.3.1 Copy files onto a second medium in case the first medium fails
3.4.4 Password Control
3.4.4.1 Can include changing your password often and making it hard to guess
3.4.5 Physical Barriers
3.4.5.1 A barrier used to protect your device- this can be as simple as a burglar alarm
3.4.6 Access Levels
3.4.6.1 You are able to choose who can see and edit your files
3.4.7 Anti-Virus Software
3.4.7.1 A form of software you install on your computer that updates every so often to protect your device from viruses

Media attachments