Вы находитесь на странице: 1из 6

Revision notes

Key terms:
Store and forward system: when an email is sent, it is stored on an email
server and remains there till the person access the email account. At this
point, the server forwards the message to them.
Address book: this is an email tool that allows you to store the names,
emails and other contact details for people.
Attachment: a file or document that you attach and send with an email.
Cc: this stands for carbon copy. You can copy in additional email
recipients using this field.
Bcc: this stands for blind carbon copy. You can copy in people to emails,
but hide their identify and email address from other recipients, by
entering them in this field.
Benefits of email include:
Speed off delivery.
Cost, unlike the conventional mail system, there is no additional cost to
the standard broadband charges
Instant delivery on a global scale
Delivery to multiple recipients
Attachments (e.g. documents and audio and video files)
Having a record of the correspondence between uses
Webpage providers (include Hotmail and Gmail) tend to store emails on a
remote provider, meaning that you can access them anywhere via a web
browser.
Drawbacks of email include:
Privacy and security, People can hack into your emails and read material
that should not be available to them. Some of that material may pose a
risk to your security, that of your employer or even that of the nation.
Internet access, the fact that both sender and recipient (s) have to have
email accounts can be a problem. Some people do not access the internet

(or chose not to use it), so you cannot assume that everyone has an email
account.
Sometimes a lack of interactivity may be a problem. In situations where
an instant reply or interactive discussion is needed, email does have
limitations if the participants are not online at the same time.
Spam, viruses and phishing scams
Key terms box:
Protocol
Simple mail transfer protocol

post office protocol 3

Internet message access protocol

acronym description
SMTP
The internet standard used for sending
messages across ip networks in server-toserver transfers. Also used by email users
to send a message to an email server.
POP 3
Used to retrieve emails from an email
server over a TCP/IP connection. This is
the most widely used email retrieve
protocol. Normally users download emails
to their local computer using POP 3- this
deletes them from the email server.
IMAP
This is the other popular email retriever
protocol. Normally users work on the
emails as they reside on the email server
using IMAP and do not download them.

VIOP= voice over internet protocol.


Wireless network= wireless networks are another means by which data
can be exchanged between a computer and a network, including the
internet.
Transmission codes:
1) Simplex transmissions: sends data in one direction only.
2) Half-duplex transmissions: allows two-way transmissions, but the
devices dont transmit at the same time.
3) Full duplex transmission: allows two-way communication at the
same time.
Parallel and serial transmissions:
Parallel transmission: in parallel transmitted simultaneously over an
equal number of wireless/channels. This allows the bits in the whole
byte of the information to be transferred together. It is a short
range, with an absolute maximum of around 5 metres. Parallel

transmissions used to be popular for connecting printers to


computers, but it is really used these days in computing because of
its cost and limited range.
Serial transmissions: in serial transmissions, bits are transmitted
one at a time over a single wire/channel. These reduce the cost of a
cable, but give a slower rate of data transfer. There is also some
additional complexity, as bytes have to be disassembled into
individual bits for transmissions and then reassembled after receipt.
Serial transmissions can be used over large distances.
Key terms:
Client-slide processing- when the interaction between a web page
and code occurs directly on the users computer.
Benefits of it: speeds: the interaction may be faster once the code
has been downloaded with the page.
Security: it is more secure as all the action takes place in the
downloaded page and nothing comes from the browser, which could
cause corruption or security problems.
Disadvantages: it is browser specific: not all scripts work on the
same way as the browsers.
And the computer speed- it can be affected by the speed of your
own computer.
Key terms:
Server-side processing= when the interaction between a web page
and a computer is processed through a server.
Benefits:
Efficiency: complex code may run more efficiently, as it does not
have to be downloaded on to the users computer.
Browser independent: the code is browser independent, so it can be
run on any web browser.
Speed: performance is affected only by the speed of the web server.
As all of the processing is done on the web server, the speed of you
own computer is only significant for the downloading of the web
pages.
Disadvantages:
Security: the exchange of data over the network my present security
risks.

Overloading: a server needs to be able to cope with large volumes


of users.
Database structure: a database is a system for managing a
collection of data. Data about a particular type of thing- for
example, costumers or product- is stored in a table. You can think of
a table as a grid. Every row in the table holds information about a
single item; this is also called a record. Every column holds
information about a property of the item in the table, such as a
customers name or an items price- these properties are called
fields.
Data types:
Text: sequences of letters, numbers and other symbols.
Number: represents a numerical value.
Data/time: stores dates or a combination of times and dates.
Logical: represents a value that is either true or false.
Key terms:
Database: a collection of data stored in a structured way.
Table: a two-dimensional representation of data in a database.
Record: a group of selected data that is associated in some way.
Field: a single piece of data within a record.
Primary key: a single unique key used to identify each record in a
table.
Foreign key: a field that can be used to cross-reference and
access associated information across many tables.
Online databases are databases that are accessible using a
network, including the internet. There are local databases that
can be accessed and possible updated by millions of people.
People use search engines to find stuff on a database. Special
database software helps people to build their own database but
only some of it is free. The more sophisticated software usually
incurs a charge.
Database management: database management system (DBMS)
is the programs that allow you to create any database that you
need and to use the databases you have created.
The DBMS allows you to create, maintain, search and sort data
on a database. It allows different users to access the database at
the same time, and can provide different levels of access to the
data.

Remember: a database is a collection of data that is usually


structured. A DBMS is a software that allows you to make use of
that data.
Structured query language:
1) Data definition language (DDL): this is the part that is used to
define the database structure.
2) Data manipulation language (DML): this is the part used to
add, delete, change and query the data that is held in the
database structure.
Types of threats:
1) Opportunist threats: someone who damages or seals
information, programs or even hardware on a computer
that has been left on and logged on by a user.
2) Computer viruses: they are small programs that attach
themselves to emails or files and can make changes to
your computer desktop.
3) Other malware: examples: computer worm and Trojan
horse: this allows a hacker full access to a system, spyware
and adware.
4) Phishing: this tries to gain access to passwords, financial
details and other information; this is often done by email,
websites, instant messaging or social networks.
5) Accidental damage: this may be caused by a natural
disaster- flooding, mischief or accidental mishap can lose
you all the computer data.
Key terms: malware: a hostile, intrusive or annoying piece
of software or program code.
Importance of security:
An attack could result in some form of loss (data or
financial) to an individual, organisation and/or society.
The Data Protection Act 1998 is a United Kingdom Act of
Parliament which defines UK law on the processing of data
on identifiable living people. It i9s used to define UK laws
on the processing of data.
Preventative and remedial actions:
1) Physical barriers: this includes turning off computers
locking officers to help prevent damage by people and
natural damage.

2) Password control of access: it is a way to log onto a


computer and so that no one else can access the data
on it.
3) Access level: these can be set up top allow individuals to
access only specific levels of an application.
4) Anti-virus software: this is set up to intercept computer
viruses.

Вам также может понравиться