Вы находитесь на странице: 1из 14

Unit 8 - Using the Internet(Gold INGOT)

1.1 I can identify different types of connection methods that can be used to access the
Internet
Fill out the table below and put it into your weebly.

QUESTION

Wifi Hotspot

3g internet connection

Explain what each of the 2


internet connections are.

It is connected to a real
hardwired provider e.g. BT

mobile internet connection

Give 1 advantage for each


internet connection

You can have high upload


and download speeds

Portable means of internet


connection

Give 1 disadvantage of
each internet connection

it can add up to a large bill


if used a lot

has slow downloading


speeds

1.2 I can identify the benefits and drawbacks of the connection method used
Look at the table below and answer the questions underneath the table into your weebly

Vodafon

giffgaff

Three

EE

O2

Data allowance

Unlimited

5GB

7GB

20GB

5GB

Fair usage policy

No [1]

Yes

Yes

Yes

Yes

4G included [2]

Yes

Yes

No

Yes

No

Use data abroad at no extra cost

Yes [3]

No

No

No

No

Tethering [4]

Yes

Yes

Yes

Yes

No

Monthly cost from [5]

17.00

27.99

25.00

40.00

15.00

1. Look at the table above, which mobile contract is the best for internet.
Give 2 reasons why.three the data allowance is unlimited and it comes
cheaper then others wich have less data allowance and is 4g with no fair
use policy
2. Look at the table above, which mobile contract is the worst for internet.
Give 2 reasons why. ee it is expensive and there is no abroad data and it
only gives you 5gb
3. Give 1 advantage and 1 disadvantage of the traditional Dial up
connection. it is easy to connect to you don't need any passwords but
you are limited to a certain range
4. Give 1 advantage and 1 disadvantage of the latest broadband internet
connections they are fast and have big downloading and uploading
speeds but they are expensive

1.3 I can get online with an Internet connection


In your weebly write the following statement

I have shown plenty of evidence that suggests I have accessed the


internet

1.4 I can use help facilities to help solve internet connection problems
In your weebly:

Show a print screen of accessing a forum with an answer to help you


with the following internet connection problem:-

error message: "Please check your internet


connection or try again later"

2.1 I can select and use browser tools to navigate webpages


Fill out the table below and put it into your weebly.

QUESTION

Internet Explorer

Google Chrome

1. Which Browser is easier


to use and why?(Write the
answer under the Browser
you are choosing)

This is easier to use


because it has all your book
marks on one webpage and
has a fast and easy to use ui

2. Which Browser is faster


and why?

Google chrome is faster


because it doesnt have
bloat ware

3. Which Browser is able


to be used on many types
of computer? (put a X
under the correct answer)

4. Which Browser is only


used on Windows
operating systems(put a
X under the correct
answer)

5. Give an example of a
plugin for each browser

Adobe flash player

Ad blocker pro

2.2 I can identify when to change settings to aid navigation


Answer the following questions in your weebly
1. When and why would you enable javascript on your browser? when you are playing a
certain game because it might need java

2. Show a print screen which shows how to enable Javascript in Chrome

3. What actions can you take to make your browser run quicker? delete all history and cache
4. What security settings can you enable on your browser to keep safe online? You can
enable stop pop ups to stop pop ups and prevent certain sites from being opend
5. Name 1 Google Chrome extension that you use and why.ad blocker pro it block me from
seeing annoying ads
6. Why and when would you use the Ctrl + and Ctrl - keys in a browser? To zoom in or out
so you can see a image more clearly
7. What does it mean to go INCOGNITO on a browser, and why is it useful? When you
dont want anyone to see your history what you have been searching

2.3 I can adjust browser settings to optimise performance and meet needs
In your weebly write the following statement :
I have successfully passed 2.2, and as a result 2.3 is complete

2.4 I can identify ways to improve the performance of a browser


In your weebly

Show a print screens of you being able to Clear the Cache and browsing History.

3.1 I can select and use appropriate search techniques to locate information
efficiently
Fill out the table below and put it into your weebly.

QUESTION
1. You need to find pictures of the
most recent queen of England.
Write down what you will be typing
in Google Search

Answer
the latest queen of england

2. Show a print screen of the


number of results that have come
up.

3. We want the same search but


with less results and we want to
get rid of pictures that arent of the
current queen. You will need to
change the keyword search. What
have your keywords changed to
now?

4. Show a print screen proving that


the keyword search you have used
above, produces less results to
look through.

5. Use the same keywords in


question 3 to search using a
different search engine. Which
search engine are you going to
use?

6. Show a print screen showing the


number of results of this search.

7. Why do the search results not


match?

Because google may have more rights


then bing

3.2 I can describe how well information meets requirements


Fill out the table below taking into account the search and audience. Put it into your weebly.
Search.- Is there a loch-ness monster?
Audience:- 10 year old children

QUESTION

Answer

1. Provide the web address of 1


source of information that is
biased and backs the claim that
there is a lochness monster.

http://www.lochness.co.uk/fan_club/

2. Is the website valid? i.e does it


prove that there is a lochness
monster.

yes

3. Provide another independent


website source that proves that
there is a lochness monster

http://www.nessie.co.uk/index.html

4. Provide 1 more independent


website source that proves that
there is a lochness monster

http://www.fanpop.com/clubs/loch-nessmonster

5. What do you think? is there a


lochness monster. Give reasons,
referring back to the sources you
have looked at.

no I dont think so because there is no


solid proof of its existence just hoaxes

3.3 I can manage and use references to make it easier to find information another time
In your weebly:
Show a print screen of you using bookmarks in your Chrome browser whilst logged on, so
that the bookmarks exist whenever you log into google.

3.4 I can download, organise and store different types of information from the Internet
Write the following statement into your weebly
My assessor has seen me do this.

4.1 I can identify opportunities to create, post or publish material to websites


Write the following statement into your weebly
I have done this in my Collaborative Technologies and IPU unit
4.2 I can select and use appropriate tools and techniques to communicate information
online
Write the following statement into your weebly
I have done this in my Collaborative Technologies and IPU unit

4.3 I can use browser tools to share information sources with others
Write the following statement into your weebly
I have successfully completed 3.3, and as a result this criteria has been completed too.

4.4 I can submit information online


Write the following statement into your weebly
I have completed Collaborative Technologies where I developed my use of Google Drive
and of course Weebly.

5.1 I can describe the threats to system performance when working online
Answer the following questions in your weebly
1. Describe what contention is and how it slows down your online experience? it overloads the
system so your online experienced is slowed down if you use it too mouch
2. Why would a virus checker slow down your online experience?its running in the back ground
slowing it down
3. How does malware slow down your system?it starts doing background task you dont want It
to do

5.2 I can work responsibly and take appropriate safety and security precautions when
working online
Answer the following questions in your weebly
1. What security risk could occur if you open up email attachments from people you dont
know? you could get unwanted viruses or malware
2. What security risk could occur if you post your picture on line and state what school you go
to? you could get a pedophile after you
3. Why is it better to sit up straight as opposed to slouching?so you have a better posture

5.3 I can describe the threats to information security when working online
Answer the following questions in your weebly
1. Why would a failed hard drive be a risk to your information it could lose all information stored
on it or not save properly
2. What is the best way to make sure your information is okay even if hardware fails? By
backing up information in sites like google drive
Using this website as a reference and in your own words, answer the following
questions in your weebly:
3. What is a cracker? Breaks into somones systems
4. What is a script kiddie? Someone who is a basic hacker and looks for scripts so they can
hack major things
5. What is a hacktivist? A cracker who hacks for a certain type of cause

5.4 I can manage personal access to on-line sources securely


Answer the following questions in your weebly
1. When you log into the school network usernames and passwords are not encrypted. What
risks does this have? They can easily be hacked and have everything deleted
2. When you log into GDrive or online banking, your usernames and passwords are
encrypted. Describe what encryption is. encryption is a code thath changes what your
password says but only you or the person who knows the code
3. Why is it important to have different usernames and passwords for different systems?
If someone trys getting into your account they will not be able to

5.5 I can describe the threats to user safety when working online
Answer the following questions in your weebly
1. In your own words, what is cyber stalking? Someone who has been following you or stalking
you online in a unwanted way
2. In your own words, give a real life example of someone who was cyber
stalked.
http://womensissues.about.com/od/violenceagainstwomen/a/CyberstalkStory.htmMy

heart was pounding, the way it does when you know you might be in trouble but
you don't want to admit it yet. Could it have something to do with my recent
change of address? I'd left an abusive relationship a few short weeks before. It
didn't occur to me to connect my problem to this escape. It must be a mistake. I
knew that I had money in my bank account, so whatever was happening with the
credit cards could be dealt with later.
3. What happened to the victim and the cyber stalker?the cyber stalker was charged and the
woman has increased the security of her accounts

Name a law which stops cyber stalking. Section 2A offence - Stalking


4. Visit the following page and in your own words state the main ways you can stay safe online
Make sure you give your own examples. You can look out for these type of users when you
are using the internet so if you have a unknown attachment do no open it

5.6 I can describe how to minimise internet security risks


Using all of your knowledge from this unit, fill in the table below stating 3 internet security
risks and how you would minimise the risk. Put the table into your weebly

3 Examples

Risk

How would you minimise


the risk?

1.email attachment

Viruses,malware,troj
an

Do not open any unwanted


files from a untrusted
source

2.pop ups

Show violent or
items not for the
underaged

Download ad blocker to
stop ads

3.malware

Slowing down and


damaging your
computer

You can use avast to stop


malware

5.7 I can apply laws, guidelines and procedures for safe and secure Internet use
Answer the following questions in your weebly
1. In our school AUP, it states that you shouldnt publish email addresses on websites, why is
this? you could be spammed or cyber stalked
2. In our school AUP it states that we should not download attachments from emails where we
dont know the sender. Why is this? It could be a virus or malware thath steals information or
damages our computer

5.8 I can explain the importance of the relevant laws affecting Internet users.
Research the following topics(Copyright Law, Data Protection Act, Computer Misuse Act)
and answer the questions below into your weebly
Copyright Law
1. What is copyright law? It is used by artist and authors to stop people from stealing there
work
2. How does copyright law protect us? Its stops people from copying our work
3. What could happen if we broke the copyright law? Get fined and have jail time
4. Whats the best way to avoid breaking this law? See if your picture has been trademarked if
it has ask the user politley
Data Protection Act
5. What is the Data Protection Act? The government has set it to keep you protected
6. How does the Data protection Act protect us? No one else can access it other then us and
keep our processing protected
7. What could happen if we broke the Data Protection Act? You could be arrested and charged
8. Whats the best way to avoid breaking this law? Cheack the terms and conditions of what
you are using to make sure you are not breaking the law
Computer Misuse Act

1. What is the Computer Misuse Act? To protect your computer against wilfull
attacks by a anonymous threath
2. How does the Computer Misuse Act protect us? It keeps work private and
protected

3. What could happen if we broke the Computer Misuse Act? You can have 12
months to a whole decade in prison on top of a fine
4. Whats the best way to avoid breaking this law? Dont break into anyones
personal files

Вам также может понравиться