Download presentation
Presentation is loading. Please wait.
1
Topic 3: Operating Online Press F5 to view!
GCSE ICT Revision Topic 3: Operating Online Press F5 to view!
2
Topic 3: Operating Online
For this topic, you need to be aware of how people can use the Internet safely. You need to be able to describe safety concerns people may have when using the Internet. You should also be able to describe laws that exist to protect against fraud and online crime. Make sure you’re reading this PowerPoint carefully, your attention will be tested at the end !
3
The Internet The Internet is a huge network that links networks of computers all over the world. All of the computers use the same protocol (rule) – TCP/IP – so they an communicate and send data to each other. One of the most widely used services on the Internet is the World Wide Web (WWW) which uses the HTTP protocol to allow users to access the documents that we call web pages. To connect to the Internet, you need to sign up with an Internet Service Provider (ISP).
4
Choosing an ISP ISPs are companies that provide customers with a means to connect to the Internet; like BT, Sky and Virgin Media. People need to consider many things when they choose which ISP (company) to sign up to. Cost – how much is the monthly fee? Bandwidth – how fast is the connection? Download limits – some ISPS have download limits! Security – ISPs might provide services like parental controls or virus protection. Reliability – how reliable is the connection/service? Support – does the ISP offer good customer support?
5
Test yourself! Which ISP offers the best bandwidth?
Fastnet Future Broadband Lavendar Mobile Flexweb Download Speed 30 mbps 8 mbps 6 mbps 20 mbps Monthly Usage 250 GB Unlimited 15 GB 100 GB Which ISP offers the best bandwidth? Future Broadband offers ‘unlimited’ monthly usage. State what this means. Fastnet. Higher bandwidth means a faster flow of data. This means there is no limit for the customer on downloads – they can download as much data as they wish.
6
Communicating on the Internet
Internet Use You need to be able to discuss how the Internet is used to communicate: Instant Messaging ‘Talking’ in real time Help collaboration Sending messages Can be accessed on a range of devices Blogs Shared online diaries Post and share experiences Communicating on the Internet Online Albums Photos hosted on a website (Flickr) Share/back up photos Social Networking Sites that allow chat, messaging, file sharing, . Voice over Internet Needs fast Internet connection. Example = Skype
7
Test yourself! Explain how having access to the Internet could enhance a family’s daily life. Help learning/school work – (always explain why/how). Shopping online – more convenient than going to the shops. Paying bills online. Compare prices online (explain the effects of this). Research travel arrangements, holidays etc. Socialising online, keeping in touch. EXAM TIP! When asked to explain, you cannot just list points; they need discussing/describing too.
8
I use the Internet to... You need to think of a range of people and consider how they use the internet. For example, a teenager uses the internet to: Keep in touch with friends through social networking sites. Download and stream movies and music. Keep up to date with news through RSS feeds. Access the school VLE (Virtual Learning Environment). Privacy is a concern for teenagers so it is important to protect personal information when communicating online by changing/updating privacy settings.
9
Security Measures Passwords are used on the Internet as a security measure to protect personal details. To enhance security, sometimes security questions are asked when signing up to a website. Security questions help further protect personal information and can be used if a user forgets their password. To prove you are human, a captcha is sometimes used when signing up to some websites.
10
Test yourself! Identify two features of a strong password.
Not easily guessed Contains numbers, upper and lower case letters and punctuation List two things you must do to keep your password secure. Change it regularly Do not write it down EXAM TIP! In the exam, when a question asks you to list, describe or discuss two (or more) things, make sure your answers are different! So for the first question on this slide – you wouldn’t give one answer as “include lower case letters” and another as “include upper case letters” because these answers are too similar!
11
Personal Space You can design your own websites and blogs and have access to your own social networking profile pages. You need to be careful because what you publish online tells the world what you are like! So, follow the four basic rules: Don’t post anything online that you would not want made public. Minimise details that identify you or your whereabouts. Keep usernames, account numbers and passwords a secret. Only share your screen names with people you know. Don’t share things with people you do not know.
12
Stealing information Personal details are valuable and can be stolen online. Filling in online forms can be one way criminals steal personal data. People need to make sure they are using a secure website by looking for in the address bar or looking for a padlock on display. Tricking people into filling in an online form is called overt data collection because people know this data is being collected. Hackers can install software called Trojans on your computer. These spy on users and record what keys are pressed on the keyboard or take pictures of the screen. Secretly installing software on a person’s computer is called covert data collection because the people don’t know that this information is being collected.
13
Identity Theft If fraudsters find out people’s personal details they can use them to make money by pretending to be that person. They could easily open bank accounts and apply for loans all in someone else’s name. Data is valuable. The government, for example, sell the personal details that people give when they tax their car through the DVLA to private companies. This is the reason sites like Facebook allow users to sign up for free – they are able to find out lots about what people like as well as their habits which can then be sold to companies or used to show users advertisements related directly to their interests.
14
Preventing Stolen Information
People need to take precautions to make sure their personal information is not stolen. Controlling Cookies Cookies track which websites you have visited to make sites load quicker or remember details about your previous visit. People should set their preferences to only accept cookies from trusted websites. People should also delete cookies regularly. Trusted websites will have a privacy policy that makes people aware that cookies are being used.
15
Preventing Stolen Information
People need to take precautions to make sure their personal information is not stolen. Phishing Phishing is a scam that tricks people into giving out personal details (overt data collection). This is commonly done through the use of bogus s. People need to be cautious when giving out information – banks never ask for passwords or personal details, especially via and people to need to consider this when they receive such correspondence. People also need to look out for the fact that a phishing does not contain their name and will probably contain web addresses that are not that of the official company.
16
Preventing Stolen Information
People need to take precautions to make sure their personal information is not stolen. Preventing Spyware Spyware is software that is installed on a person’s computer without them knowing. Spyware is usually installed when people download files online or when they open attachments from fraudsters. To prevent spyware, people need to use a firewall. People should also install antispyware protection software. Care should be taken when downloading ‘free’ programs or music.
17
Laws Two pieces of legislation (laws) are designed to protect privacy when online. The Data Protection Act 1998: this law ensures companies that hold data are required to keep it secure, not keep it longer than needed, keep the data up to date and not use the data for any other purpose without our consent. The Computer Misuse Act 1990: this law makes it a criminal offence to: Log into another person’s computer without permission Steal someone’s documents or programs Destroy or corrupt another user’s files or create viruses Gain access to financial or administrative documents and using this information to commit further crime (like fraud)
18
Test yourself! Aisha likes to buy clothes online. The websites she uses hold her personal data. Describe the law that protects her data. The Data Protection Act protects Aisha’s personal data by ensuring that it is kept secure, accurate, up to date and private.
19
Copyright Copyright protects people’s original work from being used without their permission. Original work includes; Literature (writing) Music Art Sausages Images Software Drama Sound recordings Films
20
Why bother with Copyright?
People spend a lot of time and money creating original work so they deserve to be paid for them. If professional artists cannot make any money from their work, then they will not be able to afford to create any more. Breaking copyright law (by downloading music illegally or sharing videos on the Internet) is called Copyright Infringement and is a crime. People can be prosecuted for copyright infringement and could go to prison or face a fine. Internet Service Providers may prevent use of the Internet for people breaking copyright laws.
21
Test yourself! Michael uses a search engine to choose an image to go on his blog. Explain Margaret’s legal responsibilities when using images. Michael should not use the image without permission of the copyright owner because he would be breaching copyright law. He should ask the owner’s permission to use this image to protect intellectual property rights.
22
Were you really reading?
Just to check you were really reading and revising this topic content, did you notice... On slide 22: Michael turned into Margaret half way through the question being asked? On slide 20: sausages is listed as something protected by copyright (this is clearly not true, do not write this in the exam!) On slide 11: you were asked to follow four basic rules but given five in the list in total... I bet you were thinking I can’t count, right?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.