Input devices Output devices Wired Methods Ethernet ADSL Fibre Optic.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Term 2, 2011 Week 1. CONTENTS Sending and receiving devices Mobile devices connected to networks – Smart phones – Personal digital assistants – Hand-held.
Cambridge Nationals R001 Revision Guide – June 2014.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Legislation in ICT.
Computer Networks IGCSE ICT Section 4.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Cambridge Nationals The use of wired and wireless technology to transfer information to portable devices and the benefits and drawbacks of doing so.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
G OO GLE GLASS For more notes and topics visit: eITnotes.com.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
General Purpose Packages
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
Module Designing Computer-based Information Systems
INFORMATION TECHNOLOGY Personal Electronic Devices Information Technology College of Public and Community Service University of Massachusetts at Boston.
Unit 1 Living in the Digital WorldChapter 1 Let’s Communicate This presentation will cover the following topic: Which kind of computer?
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Online Calenders Lesson Objectives To understand what an Online Calendar is To understand the uses of an Online Calendar.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Networks.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
PC Computers or Desktop Computers: Usually a computer box or case with built In internal Hard Drive, Processor, power supply, and CD or DVD Rom hooked.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
Data Protection Act (1998).
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Understand how a router works and its purpose
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Networks : What is a network? A Network is formed when 2 or more computers (devices) are linked together. Every computer or device on a network can send.
Facebook privacy policy
Data Protection GCSE ICT Mrs N Steventon-2005.
Handling Personal Data
Legislation in ICT.
Data Protection Act.
THE PYRAMID OF KNOWLEDGE
Ian Ramsey C of E School GCSE ICT On the move How can we connect?
Unit# 5: Internet and Worldwide Web
Legislation in ICT.
24/7/365 Remote Computer Support
Communicating in the IT Industry
Presentation transcript:

Input devices

Output devices

Wired Methods Ethernet ADSL Fibre Optic

Wireless methods Wi-Fi Bluetooth Infrared 3G and 4G (Mobile Data)

Network Name (SSID) An SSID (service set identifier) is the name of a wireless local area network (WLAN). All wireless devices wishing to connect must use the same SSID in order to communicate with each other.

Security Key Security keys are used to exchange messages between devices. These are commonly encrypted with WEP (Wired Equivalent Privacy). This is set through the network router setup wizard. It is a sequence of hex digits chosen by a network administrator and assists with securing the network connection. As with all technology WEP has been superseded by WPA (Wi-Fi Protected Access) and WPA2 which provide greater security.

You can store data on... CD/DVD (Optical Disk) Memory Cards External Hard Drives Solid State Drives USB/Memory Sticks Cloud Storage

Archiving An archive tends to be the backup of data for long- term storage. The user does not expect to retrieve this data but it is there in case they have to. In this storage the medium has to have a long shelf life.

The Data Protection Act (DPA) The Data Protection Act 1998 sets out to protect the privacy of personal information. It covers data held on computers and paper

What should data be?

Data must be fairly and lawfully processed (used) 2. used for limited purposes 3. adequate and relevant. Only what is needed may be used 4. accurate 5. not kept for longer than is necessary 6. accessible to the individual and able to be corrected or removed where necessary 7. secure 8. not transferred to countries without adequate protection.

Possible Legal Implications if any of the 8 rules are breached For serious breaches organisations can be made to pay up to £ The organisation can be prosecuted/fined/sued if the data is stolen and not held securely

Data held must be protected from lost, so if the data is lost an offence has occurred. Furthermore the organisation will need to tell the person whose data it was. The information commissioner can issue the organisation to improve their data security. The information commissioner can serve an assessment to investigate their data security.

What are the implications for someone if their data is stolen?

You may need to change some of your details because personal data that is lost may allow access to your bank account Steve’s account may get money taken out as Steve’s personal details allow others to impersonate him

How can data be protected?

Antivirus – To protect files from virus’ Access permissions and user accounts – Only let certain people view files Password protect files – so people can’t just open them Use secure networks – Password protect your network

Exemptions Any personal data that is held for a national security reason is not covered. So MI5 and MI6 don't have to follow the rules. The taxman or police do not have to disclose information held or processed to prevent crime or taxation fraud. Criminals cannot see their police files. Tax or VAT investigators do not have to show people their files. A school pupil has no right of access to personal files, or to exam results before publication.

The roles of those involved A data subject is someone who has data about them stored somewhere, outside of their direct control. e.g. a bank stores its customers' names, addresses and phone numbers. A data controller is a person or company that collects and keeps data about people. The Information Commissioner is the person (and his/her office) who has powers to enforce the Act.

What is an online Calendar An online calendar is a web application that allow one or more users to edit, and optionally share with other users, online access to a calendar.

Uses of an online Calendar They can be shared between two people Both users (Jackie and a Technician for example) can add, edit and view jobs

You have the ability to access from anywhere Technicians can access the calendar on their Smartphone's

Reminders can be set up for jobs technicians can be alerted before the job is to start

Notes can be added to jobs/blocks If a job is completed/there is a problem at the job, the technician can leave a note

Online calendars include messaging systems Users can contact each other is there is ever a problem

Jobs are less likely to be double booked

There is a search facility If a job for a customer needs to be cancelled it can easily be deleted

This may come up in your exams...

What is a Smartphone? A Smartphone is a portable device that is able to perform many of the functions of a computer, typically having a relatively large touch screen and an operating system capable of running general-purpose applications

Features of a Smartphone Internet browsing sending s gaming making calls navigating with GPS maps sending messages touch screen on most devices Any More?

How can a Smartphone track what someone does? Call Logs Cookies GPS Internet History

Call Logs Smartphones keep a list of all your recent phone calls. They can provide a list of missed and answered calls.

Cookies A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website.

GPS GPS Chip in Device GPS Chip Picks up signal from satellite to determine location This can then be sent via internet to 3rd Party What Apps use GPS?

Internet History Your mobile phone keeps track of all the web pages you visited You can then access your history if you wish to revisit a website

How can Smartphone’s connect to a Wired network Smartphone’s can use their ‘Sync’ cable to connect to a Computer. PCs on the other hand can connect to a wired network using Ethernet cable.

How can Smartphone’s connect to a Wireless network Wifi - allows an electronic device to exchange data or connect to the internet wirelessly using microwaves (not microwave ovens) 3G or 4G - stands for third or fourth-generation and refers to technology that allows mobile phones to access the internet Bluetooth - short-range wireless interconnection of mobile phones, computers, and other electronic devices

How can you communicate using a Smartphone? Calling Texting ing Video Conferencing (Facetime, Skype) Using messaging apps (Whats app) Social Networks Any other ways?

Advantages of a Smartphone Portable Devices that can fit in your pocket Can perform similar tasks to that of a PC (Greater functionality) A better battery life than most portable devices On the go access to the internet Allows you to work on the go Better information sharing Access to GPS Entertainment Any more? I wish I had my...

Disadvantages of a Smartphone Battery may ran out If out of signal then phone functionality drops Some have limited storage Easily lost (How can apps help us?) Easily damaged Expensive to purchase and run (Contract)