Unit 1: The Online World Revision Mindmap

Mind Map by , created over 5 years ago

Mind Map on Unit 1: The Online World Revision Mindmap, created by 10whiteheadh on 04/25/2014.

Tags No tags specified
Created by 10whiteheadh over 5 years ago
The Biological basis of Heart Disease
Andrea Leyden
GCSE AQA Biology 1 Cloning & Genetic Engineering
Lilac Potato
A View from the Bridge
Mrs Peacock
Système circulatoire sanguin
Martin Fortier
Účto Fífa 2/6
Bára Drahošová
Biology : Basic Terms
Paul Fisher
General Knowledge Quiz
Unit 1 Sociology: Family Types
Spanish: Grammar 3.2
Selam H
Principles of basic electrical circuits
Unit 1: The Online World Revision Mindmap
1 Learning Aim A: Online Services and Communication
1.1 Online services
1.1.1 Communication Provides the ability to communicate with others. Could be via a website, imessage or app
1.1.2 Entertainment Website designed for entertainment purposes e.g. TV catchup
1.1.3 Educational / VLE (Virtual Learning Environment) Ability to learn online e.g. Moodle
1.1.4 Governmental Allows you to access opportunities like online tax returns etc.
1.1.5 Real time Information Provides the ability to access information as it happens. Could be through an app, website or electric signage
1.1.6 Commerce More related to money than others. Ability to purchase items, check bank balance etc.
1.1.7 Download Allows you to download apps, music, videos etc.
1.1.8 Business Communicate with colleagues or complete work from home
1.2 Online Advertising
1.2.1 Pay Per Click Advertisers pay publishers when the ad is clicked
1.2.2 Affiliate Model Website about a certain topic promotes other websites related to the same topic
1.2.3 Banners A picture or text at the top of a website promoting a business or product
1.2.4 Email Marketing Marketing commercial messages to groups of people using their email
1.2.5 Benefits Targeted audience A good way of branding Trackable e.g. measure number of clicks Cost effective
1.2.6 Drawbacks Can be irritating People might delete it without reading it Not everyone uses the Internet Internet frauds e.g. credit card details can be stolen when a purchase is made Slows down the webpage
1.3 Online Documents
1.3.1 Compressing Files Used to reduce the size of files
1.3.2 How it works Documents are stored online and can be edited and shred with people by inserting their email address. The document is sent with a secure link to the one document (no extras made). Collaborators can edit and save the document e.g. once the document is edited by someone else you can see the changes immediately i.e. no confusion with updates or different versions
1.3.3 Benefits It is free No more confusion with numerous copies Different types of documents are able to be stored e.g. presentations Secure Immediate availability
1.3.4 Drawbacks Can be time consuming Difficulties determining authenticity and reliabiltiy Can be low quality
1.4 Ubiquitous Computing
1.4.1 An advanced computing concept where computing is made to appear everywhere and anywhere
1.4.2 RFID (Radio Frequency Identification) A technology used in Ubiquitous Computing. It is a chip implanted into an object which can be used for tracking
1.5 Cloud Computing
1.5.1 Online Storage Practice of storing data with a third party service through the Internet
1.5.2 Storing, managing and processing data online rather than on a local server or personal computer
2 Learning Aim B: Components of the Internet
2.1 The Internet (Interconnected Networks)
2.1.1 Internet Infrastructure Client A computer/workstation that is capable of obtaining information/applications from a server Server A computer program that provides services to other computers Router A small device that joins multiple networks together Internet Key Terms The Internet A global computer network providing a variety of information and communication facilities consisting of interconnected networks WWW (World Wide Web) An information system on the Internet which allows documents to be connected by hyperlinks enabling the user to search for information IP (Internet Protocol) A set of rules governing the format of data sent over the Internet TCP (Transmission Control Protocol) A protocol developed for the Internet to get data from one network device to another FTP (File Transfer Protocol) Protocol that allows users to copy files between their local system and any system they can reach on the network ISP (Internet Service Provider) A business/organization that offers users access to the internet and related services POP (Point Of Presence) The point at which 2 or more different networks or communication devices build a connection with each other NAP (Network Access Point) Public network exchange facility where ISP's connected with one other in peering arrangements Connecting Backbone The principal data routes between large, strategically interconnected networks and core routers on the internet
2.1.2 World Wide Web URL's (Uniform Resource Locator) The address of a certain website on the Internet. Features: no spaces or other characters and uses forward slashes to indicate different directories Search Engines A website used to search for other websites ISP (Internet Service Provider) A business/organisation that offers users access to the Internet HTML (Hyper Text Mark-up Language) A system for tagging files to achieve effects on World Wide Web pages Web Browser A package used to access the Internet
2.1.3 Internet Connection Methods Dial Up Using a modem to connect to the Internet. The modem connects to the computer and standard phone lines which serve as the data transfer medium Broadband Bandwidth A range of frequencies within a given band that is used for transmitting a signal Transmission Rate The speed at which a network device communicates within the network Wireless Using radio, microwaves etc. (as oppose to wires and wires) to transmit signals
2.1.4 Email Features CC (Carbon Copy) An address typed into the CC line in an email means they will receive a copy of the email you're sending BCC (Blind Carbon Copy) A copy of an email sent to a recipient whose email address doesn't appear in the message Address Book A database that stores email addresses of people who you have emailed Attachments A file attached to an email Priorities You can assign a priority to an email Benefits Delivered extremely fast compared to traditional post Can be sent 24/7 Emails can be sent and received from any computer in the world with Internet access Cheaper than sending a letter Emails can be sent to one person or several Drawbacks Recipient needs Internet access to receive the email Viruses are easily spread through attachments Phising Spam Email won't be read until the receiver has logged on
2.2 Data Exchange
2.2.1 VOIP (Voice Over Internet Protocol)
2.2.2 Transmission Methods UTP (Unshielded Twisted Pair) /STP (Shielded Twisted Pair) UTP cables are basic pairs of cables twisted together. STP cables are similar but have a foil shielding Coaxial A solid wire core separated from a copper-braided outer cable by a plastic sheath. The inner cable transmits the data and the outer cable connects to earth. FibreOptic Light is used to carry data and information which is passed down cables. The cable is made of glass and thinner than a human hair which makes it flexible and strong. Infrared Short range data transmissions using infrared light. Microwave Short wavelength radio transmissions working at high frequencies Satellite Data is transmitted to Earth from a satellite, which relays it to the relevant receiving station on Earth
2.2.3 Transmission Modes Simplex Data is only transferred in one direction e.g. Radio Broadcasting Half Duplex Data is transferred in 2 directions but one at a time. e.g. Walkie Talkies Duplex (sometimes Full Duplex) Data is transferred in 2 directions simultaneously e.g. Telephone Conversation Serial Transmission Bits are transmitted one at a time over a single channel. Reduces cost of cable but makes transmission slower. Parallel Transmission A number of bits are transmitted simultaneously over an equal number of channels Client Side Processing Operations performed by the client in a client-server relationship in a computer network Server Side Processing Operations performed by the server in a client-server relationship in a computer network
2.3 Data Storage
2.3.1 Online Databases A database accessible from a network e.g. the Internet as appose to one held on attachable storage e.g. a CD
2.3.2 DBMS (Database Management Systems) Software that handles the storage, retrieval and updating of data in a computer system
2.3.3 Relationships A situation that exits between 2 relational database tables when 1 table has a foreign key that references the primary key of other tables
2.3.4 Data Types A particular kind of data item defined by the values it can take, programming language used, or operations that can be performed on it
2.3.5 Database Structure A set of approaches for organising large collections of computer files commonly relating to a single subject
3 Learning Aim C: Issues with Opperating Online
3.1 Type of Threats to Data
3.1.1 Phising The practice of sending emails to people pretending to be a reputable company attempting to get hold of personal details e.g. credit card details
3.1.2 Malware (Malicious Software) A piece of software specifically designed to disrupt or damage a computer system e.g. a virus
3.1.3 Opportunist Threats When a computer is still logged on people take the opportunity to search for personal information e.g.passwords
3.1.4 Accidental Damage Damage is done to your device accidentally e.g. water spills
3.1.5 Viruses A piece of code able to copy itself which has a harmful effect on your device e.g. corrupt systems, destroying data
3.2 Personal Safety
3.2.1 Identity Theft The fraudulent practice of using another persons personal information to obtain credit card details etc.
3.3 The Importance of Security
3.3.1 It is important to protect your data so you don't lose valuable and sometimes irreplaceable information/files
3.4 Preventative and Remedial Actions
3.4.1 Firewalls A system designed to prevent unauthorised access to or from a private network
3.4.2 Encryption The translation of data into a secret code
3.4.3 Back Up and Recovery Copy files onto a second medium in case the first medium fails
3.4.4 Password Control Can include changing your password often and making it hard to guess
3.4.5 Physical Barriers A barrier used to protect your device- this can be as simple as a burglar alarm
3.4.6 Access Levels You are able to choose who can see and edit your files
3.4.7 Anti-Virus Software A form of software you install on your computer that updates every so often to protect your device from viruses

Media attachments