Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Unit 1 GCSE ICT Revision

No description

Lauren Whipp

on 20 May 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Unit 1 GCSE ICT Revision

Click on a frame to revise Unit 1 GCSE ICT Revision 1. Networks Online Goods and Services Personal Digital Devices 1. Choosing an ISP Mobile Phones
Personal Computers
Camera's & Camcorders
Home Entertainment
Portable Media Players
Navigation Aids Online Communities 1. Functions SMS (Short Message Service) - to send text messages
Camera – still images and video
Bluetooth – allowing data to be exchanged over short distances between devices
Wi-Fi (Wireless Fidelity) –to exchange data but the signal can travel long distances
Internet – to browse web pages and send messages via web mail
MP3 player – to listen to music files
Touch screen – to make it easier to use
3G – allows the user to access the Internet via a mobile phone network
Games and apps – software for entertainment or practical uses
Predictive text – makes it easier/faster to send SMS messages
GPS (Global Positioning System) – can pinpoint your location via satellite Issues 1. Camcorders 1. Home Entertainment systems Mobile Phones 4. Memory Cards Memory cards are used as secondary storage – they store data files on the phone. Memory card size is measured in gigabytes. There are two types of memory card: SD and SDHC. 3. Functions SD SDHC Flash memory with max storage of 2 GB Flash memory with max storage of 32 GB Good for storing photographic images Good for storing video files 2. Functions 5. Phone Design 6. Mobile Phone rules of use Personal Computers 1. Types of Computers 2. Types of Computers 3. Parts of a Computer 4. Peripherals 5. Buying a new computer Camera's and Camcorders 2. Digital Camera's Home Entertainment DVD PLAYER - Plays DVD discs
- Most DVD players have to be connected to a TV
- Some are smaller, portable devices which have an LCD screen and speakers
- Portable DVD players can be used when travelling 2. Home Entertainment systems BLU-RAY DISC (BD) - Bigger storage capacity than a DVD disc
- Was invented to allow the recording, rewriting and playback of high-definition video (HD)
- Offers more than five times the storage capacity of
traditional DVDs 3. Home Entertainment systems HOME THEATRE PC - High spec PC with Media Centre software
- Lots of storage for video and music files 4. Home Entertainment systems HDTV - High Definition TV
- Clear pictures with vivid colours and up to five times more detail than standard definition
- More and more programmes are being made in HD
- Most new flat-screen televisions (LCD and plasma) are able to show HD programmes Portable Media Players MP3 players and IPods are digital audio players. However, mobile phones, tablet PCs and even camcorders now fall into this category. They allow you to: - Listen to a large volume of music files
- Record and watch video footage
- Play games
- Download apps
- Send messages over the Internet
- Interact with other users (e.g. VoIP)
- Use Cloud storage Navigation Aids
(Sat Navs) These devices are used to help guide people to a destination using GPS technology. They
display map information on a small screen and can receive and display real - time traffic information. Systems can be connected to a PC to update the street -mapping software (if roads change). Connectivity Home Networking
Bandwidth and Latency
Communication Home Networking (Digital Communications) 2. Advantages and Disadvantages
of a Home Network 3. What type of Home Network
could I use? Bandwidth and Latency (Speed of Data Transfer) The ability to load a web page in a browser or to transfer data depends on two things – bandwidth and latency. Communication Communicating Online
Advantages of VoIP and video conferencing
Disadvantages of VoIP and video conferencing 1. Communicating Online http://fronter.com/hillingdon/links/files.phtml/51836a1e7ae76.1683651051$42356880$/Resources/Unit+1/Revision/2+Connectivity/Communicating+Online/index.html 2. Advantages and Disadvantages
of email http://fronter.com/hillingdon/links/files.phtml/51836a1e7ae76.1683651051$42356880$/Resources/Unit+1/Revision/2+Connectivity/email.swf 3. IMAP vs POP3 http://fronter.com/hillingdon/links/files.phtml/1683651051$42356880$/Resources/Unit+1/Videos/flashvideoplayer.html?video=content/Why%20You%20Want%20IMAP%20Over%20POP3.f4v http://fronter.com/hillingdon/links/files.phtml/518a4b4edfcc6.1683651051$42356880$/Resources/Unit+1/Revision/3+Operating+Online/InternetJargon.swfAdvantages of VoIP and Video Conferencing http://fronter.com/hillingdon/links/files.phtml/518a4b4edfcc6.1683651051$42356880$/Resources/Unit+1/Revision/2+Connectivity/VoIP.swf 5. Disadvantages of VoIP and Video Conferencing http://fronter.com/hillingdon/links/files.phtml/518a4b4edfcc6.1683651051$42356880$/Resources/Unit+1/Revision/2+Connectivity/VoIP2.swf Operating Online Choosing an ISP
Data Protection
Security Risks
Personal Spaces
Copyright http://fronter.com/hillingdon/links/files.phtml/518a4b4edfcc6.1683651051$42356880$/Resources/Unit+1/Revision/3+Operating+Online/ChoosingAnISP.swf Internet Jargon http://fronter.com/hillingdon/links/files.phtml/518a4b4edfcc6.1683651051$42356880$/Resources/Unit+1/Revision/3+Operating+Online/InternetJargon.swf Data Protection 1. Data Protection Companies and organisations have a responsibility to keep personal data safe whether it’s stored online or on a computer in an office.
Some data, such as medical or bank records, can be very sensitive.
Storage of data and backup would be a major consideration. Data
could be stolen, unlawfully disclosed, deleted by accident or destroyed by a fire or flood. 2. The Data Protection Act 1998 The Data Protection Act 1998 is a law which applies to these companies and organisations.They must abide by the rules. There are eight principles: Security Risks 1. Security There are many dangers faced by computer users and it’s important that a computer system or network is protected. 2. Hacking Hackers try to gain unauthorised access to a computer system or network. They want to obtain data which can be used for criminal or malicious activities. Installing a firewall (or switching a Windows firewall on) or not using peer-to-peer software, will help prevent a hacking attack from
being successful. Spam This term describes advertising emails that are sent out to large groups of targeted computer users. The amount of spam you receive in your in-box can be reduced by turning on the spam filter in email software. 3. Computer Viruses - These are programs that can replicate themselves. They may spread by infected hardware (e.g. USB memory stick), email systems, file downloading, etc. - If a virus infects a computer it can cause serious damage to the hard
drive and cause it to cease working properly. - Viruses may delete files and folders. - Viruses can be prevented by the installation of anti-virus software. This needs to be updated regularly so it can deal with newer viruses. Spyware This is a program that can ‘spy’ on your computer activities and is usually installed without
your permission (you probably wouldn’t know it was there!).
It collects data and then sends it to the source.
Spyware may be used to collect browsing histories–
for marketing – or for illegal purposes. 4. Trojans - Trojans are similar to viruses but they cannot replicate themselves. - This is software that looks harmless but is actually a malicious
program. Trojans are usually downloaded from free download sites. - Some Trojans allow hackers to gain access to computers. They may contain key -logging software that records keystrokes. - Trojans may be prevented by the use of a firewall and anti-virus software. Cookies These let websites remember you. If you visit an online shopping website and register, a cookie may record your personal data and browsing activity. This lets them target you next time you go on their site with items that may interest you.
Some retailers pass your details on to other companies who will also target you with unwanted marketing emails. Companies should always ask your permission before doing this. - A false, phishing web page usually prompts the user to type in their username and password (e.g.online banking website). The thieves then obtain the user’s personal data and access to private online accounts. 5. Phishing - A victim of phishing will received an email with a hyper link to a website. The website looks official but it isn’t –it’s a clever fake. - Phishing leads to fraud. - Phishing emails sometimes contain tell-tale signs – spelling mistakes and poor grammar. The hyperlink may take the user to a website that doesn’t have the company’s official website address. - They also try to scare people into entering data. For instance, they might tell them that they need to follow the instructions urgently or their account may be closed. 6. Pop-Ups These appear automatically on your computer and contain adverts or messages. They are used as a marketing tool and their aim is to attract your attention. Pop-ups usually get onto your computer after you have downloaded
a file from a website. Social networking sites provide lots of data about the members – name, location, images, etc. It is always better to turn on the privacy settings. This will control who can look at your profile and access the information stored about you. Criminals steal personal data about people so that they can use it for unlawful purposes (such as obtaining a passport or setting up a bank account in order to commit fraud). Identify Theft 7. Privacy Individuals and organisations are now eager to gather data about browsers and consumers. Not all are legal. Personal data is now a valuable commodity. They use:
- Cookies
- Phishing
- GPS tracking - Some companies sell data on to third parties for a profit, often without consent. - Data can even be lost by companies who store it (e.g. the UK government, banks). - In the UK, personal data is protected by the Data Protection Act 1998. All organisations that store data have a legal obligation to look after it properly. Other countries, however, have different legal arrangements in place. - Companies should have a privacy policy in place. You should be able to read the policy before signing up for an account. - The policy will tell account holders what their data can be used for and if the website uses
cookies. - Many reputable websites offer a tick-box system of acceptance. The user may then opt out and not allow their data to be sent to, or used, by anyone else. Personal Spaces 1. Personal Spaces Some websites allow users to obtain a ‘space’ on the Internet. This contains data about them that the user has entered. An example could be a dating website. The user registers with the company, sets up an account and creates a personal description. This could include a photo and other personal data. Other users of the website can then log in and view that person’s description. Personal spaces are usually moderated for bad language or inappropriate behaviour online. Social networking websites also allow people to set up personalised online space. It is easy to
upload images and video to a social networking site if you have an account. Most allow account
holders to send messages and share comments. Some personal spaces allow users to set up private groups (by invitation) and share files. Wikis can be classed as personal spaces. They allow people to collaborate on projects and share resources. 2. Profiling PROFILING allows the user to record their personal details online.

FORUMS and SOCIAL NETWORKING sites use profiles.

Profiles can be PUBLIC or PRIVATE A public profile can be viewed by all users, a private one is hidden. This often protects the identity of the online user. Copyright https://clipbank.atomwide.com/espresso/clipbank/servlet/link?macro=setresource&template=vid&resourceID=3434&subjectID=13&taxonomyNodeID=4474
Full transcript