Presentation is loading. Please wait.

Presentation is loading. Please wait.

Learning Aim B. Investigate components of the internet and how digital devices exchange and store information 1. Understand what the internet is, how.

Similar presentations


Presentation on theme: "Learning Aim B. Investigate components of the internet and how digital devices exchange and store information 1. Understand what the internet is, how."— Presentation transcript:

1 Learning Aim B

2 Investigate components of the internet and how digital devices exchange and store information 1. Understand what the internet is, how it works, and how it is structured. 2. Understand the concepts, functions and impact of the worldwide web (WWW).

3 1. Understand the purpose, concepts, processes and implications of email 2. Understand the concepts, processes and implications of data exchange and compare different methods 3. Understand the concepts, processes and implications of data storage

4  Find a definition of the internet. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

5

6 Remember, this is a very basic diagram we will go into detail about each specific part in the next slide

7 Server Serves other computers. Many different uses including: print server and web server Client A device that uses the service provided by the server. – Any device you use to connect to the internet is a client.

8 Router Devices that direct (route) the data through the network. They will always try and find the best route for the data Network Cables The cables that connect all of the hardware e.g. fibre optic, RJ45 and coaxial.

9 Backbone A large normally fibre optic cable used to connect a large number of devices ISP (Internet service provider) ISP’s allow you to access the internet however, they can also provide other services such as technical support and email clients

10

11  Give a definition of the following terms: 1. Client: a desktop computer or workstation that is capable of obtaining information and applications from a server. 2. Server : a computer or computer program which manages access to a centralized resource or service in a network 3. Router : A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect 4. ISP(Internet service provider): is an organization that provides services for accessing, using, or participating in the Internet. Internet service providers may be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned Complete the following diagram CLIENT ROUTER ISP SERVER

12 Task 1 Find one benefit and one disadvantage of the following three connection methods 1. Wireless 2. Broadband 3. Dial-Up

13  One Benefit is Convenience: The wireless nature of such networks allows users to access network resources from nearly any convenient location within their primary networking environment (a home or office). With the increasing saturation of laptop-style computers, this is particularly relevant.  A disadvantage is Security: To combat this consideration, wireless networks may choose to utilize some of the various encryption technologies available. Some of the more commonly utilized encryption methods, however, are known to have weaknesses that a dedicated adversary can compromise.

14  One Benefit is Easy and Fast: Superfast broadband means that you can have better access to a business plan and can plan it around a week working from home when you need to.  A disadvantage is that its Security: Higher security risk than dialup connection. A personal firewall is needed to protect your computer.

15  One benefit is Easy Access: dial-up service is that if you have a land line, all that you need is a dial-up account and the modem built into your computer to connect to the Internet.  A disadvantage is Extremely Slow: dial-up connections are extremely slow and typically have a maximum download and upload speed of 56 kbps (kilobits per second), which makes them unsuitable for streaming audio or video.

16 Not fixed to one computer Can be used anywhere not just in the home Needs to have wireless internet available Can be less secure that wired (people can steal your data if, you connect to an unsecured wireless network) Tends to be slower than a wired connection

17 Better download and upload speeds than dial-up Wired so therefore, the range of use is limited

18 Can be used with existing telephone lines meaning, it can be used in areas that do not have broadband yet. Older technology can give poor reception Usually slower than broadband or wifi. http://www.youtube.com/watch?v=gsNaR6FRuO0

19  http://www.youtube.com/watch?v=ICJqv 0TN6-c http://www.youtube.com/watch?v=ICJqv 0TN6-c  Research the different bandwidth speeds for the following three major ISP’s:  Virgin: 152Mb  Sky: up to 17Mb  BT: download speeds of 800Mbps and upload speeds of 200Mbps.  Check your own internet speed, use a site such as ‘speedtest.net’ or ‘testmy.net ’  My Own internet speed:

20

21  Infrared technology allows computing devices to communicate via short-range wireless signals. With infrared, computers can transfer files and other digital data  Can also be Bluetooth

22 Data transmission  Simplex: one-way transmission only (e.g. computer to printer)  Half-duplex: two-way transmission but one way at a time (e.g. ‘walkie-talkie’ radios)  Duplex: two-way transmission (e.g. telephone)

23  Protocols are a set of rules that allow computer systems to connect with other computer networks and transfer data. They are very important as it involves many different types of data. TCP- Transmission control protocol Takes data from the users programs Passes it to the Internet protocol IP – Internet Protocol Takes data from the TCP Organises it into packets

24  The World Wide Web is the content on the internet. Hyperlinks Hyperlinks link different pages together when a user clicks a hyperlink it takes the person to another website or page on the website Web servers Websites are stored on web servers. When a user visits a website it is temporarily downloaded onto the users computer. It is the web servers job to deliver the web page requested. Browsers- All webpages are accessed through a web browser. These are applications that allow a user to enter a URL and view a webpage.

25 1. Describe what a hyperlink is and what it does. (2 marks) 2. Explain how a user requests a web page and how it then appears on a user’s screen. (4 marks)

26 1. A hyperlink links to different pages together so when you click on a hyperlink it will take you to a page on website according to IP address. 2. Websites are stored on web servers. When a user visits a website it is temporarily downloaded onto the users computer. It is the web servers job to deliver the web page requested. All webpages are accessed through a web browser. These are applications that allow a user to enter a URL and view a webpage.

27

28  Web pages are written in a programming language called HTML, Hyper Text Markup Language. HTML is used to describe the page content.  It uses a set of predefined tags (instructions) that the web browser then interprets and renders/displays.  Used in conjunction with CSS Cascading Style Sheet for the style of the content.

29 Sir Tim Berners-Lee 1989 He created the first web client and server. Considered to be the father of the Internet. His organisation, CERN, created the World’s first webpageWorld’s first webpage

30  W3C (World Wide Web Consortium) making the web accessible to all.  Currently on 4.1 however HTML 5 has nearly taken over (October 2014 was predicted to be the completion date).

31 CodeWhat it does Information about the page Title of the page The content of the page Paragraphs Heading tags before and after text Inserts a picture file Teach ICT! Inserts a hyperlink. That the text will be linked to See Example Example Adds bold Centres the text.

32  So in for example, Notepad

33  http://www.w3schools.com/html/html5_i ntro.asp  Now you have looked at an example of a website create your own webpage using html!  Email the notepad file to your teacher (e.g. pwassell@littleheath.w- berks.sch.uk)

34  This website is stored on your computer so the world cannot see it.  To do this you would need to get a host for your website for example ‘Godaddy’ and a domain name. Domain Names can only be rented by one person a record of this is kept by the data registrar in this country it is Nominet.  HTML is very time consuming so normally we would use a program like ‘Dreamweaver’ to create it for us.

35  URL stand for Uniform resource locator.

36  There are several protocols used on webpages they are all included within the URL so that the browser knows how to handle the page it is currently on. HTTP (Hyper text transfer protocol)- This is the protocol that allows us to request web pages and download them to our computers. FTP – File transfer protocol. This is the protocol that allows us to transfer files across the internet

37  Search engines allow us to find information on the internet. Examples are Bing, Ask and Yahoo.

38

39  Give a definition of what a search engine is (1 Mark)  Give two examples of search engines (2 Marks)  Which of these is not a term for the software used by search engines (1 Mark)  Spiders  Crawlers  Bugs  Bots

40 1. A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web. 2. Google, Yahoo 3. Bugs is not used for a term in software

41 An email is an electronic message sent from one communication device to another e.g. computer, phone, mobile phone, PDA

42 Advantages of Email  Messages sent and received almost instantly  Not as formal as a letter – email is supposed to be quick and to the point  Can easily attach a copy of senders message with your reply  Email is virtually free to send  Email can be accessed using a large number of devices  Emails are more environmentally friendly

43 Disadvantages of Email  Not everyone has a computer  Makes users more casual about their approach to business  Junk mail is a problem  Worries about security aspects  The system relies on people checking their email boxes regularly  Emails can contain viruses especially attachments  Email is not secure and they can be intercepted and read This shows an email from ‘PayPal’ to me

44 Hovering here shows the website to be directed to is

45 Preventing Email misuse  There are a number of precautions that can be taken to avoid email misuse:  Email monitoring – software that can automatically perform checks to detect abusive and inappropriate language  Email parental control – parents can set who their children can send and receive emails to/from  Email encryption – coding emails so that they can only be read by the intended recipient  Spam filter – software that will automatically remove spam from your inbox  Virus scanning software – scans emails and attachments to ensure that they don’t contain any viruses before they are opened.

46 Email Abuse Example of Email Abuse Cyber bullying Sending lots of personal emails in company time Inappropriate attachments Attaching files containing viruses Sending spam Inappropriate attachments

47  Send an email to your teacher (e.g. pwassell@littleheath.w-berks.sch.uk) with a word processed document attached pwassell@littleheath.w-berks.sch.uk  Investigate the properties of your email client to find out which protocols it uses (e.g. SMTP, POP3) and write the answer in your word processed document.  Include an attached file (e.g. a picture) and copy the email to yourself (in Cc:)

48

49 Databases Microsoft Access MySQL Oracle Databases are created and maintained using Database Management Systems (DBMS) such as:

50 DEFINITION: A database is a collection of data or information which is stored in a logical and structured way

51 Advantages and Disadvantages?

52

53 Your school keeps a lot of information about every student. Think of some of the information they keep about you. name address d.o.b. phone number parent’s names doctor’s name allergies illnesses

54 Each of these contains one piece of information about you. name address d.o.b. phone number parent’s names doctor’s name allergies illnesses Each of these different types of information is called a ‘Field’

55 All of the ‘fields’ are put together to make a ‘record’ A ‘record’ is all of the data about one person or one thing.

56 Student number SurnameFirst name D.O.B.AddressPhone number IllnessesAllergiesDoctor 1042JonesEmma05/04/95123 High Street 01234 765555 NutsDr. Brown 1043SmithLouise12/08/9545 Low Road 01234 688674 DiabetesDr. Green 1044WhiteSimon26/06/9567 Middle Lane 01234 984532 Wasp stings Dr. Yellow record field Database table

57 When designing databases it is IMPORTANT that we define the data type for each field. We have to define the data type so that the database can store each piece of information correctly and so that we can ensure that incorrect data is not entered into the database fields. Within access there are many different data types.

58 Data TypeDescription TextUsed for text or combinations of text and numbers, such as addresses, or for numbers that do not require calculations, such as phone numbers., e.g. Fred or Zebra MemoUsed for lengthy text and numbers, such as notes or descriptions. NumberUsed for data to be included in mathematical calculations, except calculations involving money (use Currency type). E.g. 14.72 Date/TimeUsed for dates and times. E.g. 14/11/2015 CurrencyUsed for currency values and to prevent rounding off during calculations, e.g. £38.73 AutoNumberUsed for unique sequential or random numbers that are automatically inserted when a record is added. E.g. 1072 (following 1071, 1070) Yes/NoUsed for data that can be only one of two possible values, such as Yes/No, True/False, On/Off. E.g. Are you a resident of Berkshire? (to which the answer would be Yes/No) Hyperlink Used for hyperlinks. E.g. www.bbc.co.uk

59 When creating a new database it is also important to identify the key field or as it is often know the primary key. What is a primary key? It is a field that uniquely identifies each record in the table. It can either be a normal field that is guaranteed to be unique (e.g. country) or it can be generated by the Database such as an ID number.

60  Required Fields  Lists  Range Checks  Limiting acceptable values.  Find definitions of each of these

61 Required field- Lists- Range check- Limiting values/choices-

62  Find the definition of an“online database” An online database is-


Download ppt "Learning Aim B. Investigate components of the internet and how digital devices exchange and store information 1. Understand what the internet is, how."

Similar presentations


Ads by Google