You are on page 1of 41

BTEC 2012 Name: .

Unit 1 The Online World

BTEC Level First L2 I&CT

Unit 1 The Online World


Activities and Revision booklet
Name:

Candidate No:

Target:

Aspirational target:

Learning Aim
A
Investigate online services and online communication
B
Investigate components of the internet and how digital
devices exchange and store information

C
Investigate issues that relate to operating online.

1
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Lesson 1 - Online Services
(Student Book A Pg 3, 4)

Objectives

What is an Online services


What is online communication (real-time information, commerce,
government, education, virtual learning environments, business,
entertainment, download services)
What are the Key terms in online communication

Starter - What is an online service?



...................................

1. Fill in the gaps in the table below.

Service Types Examples Benefits


Communication Email, messaging, news Using social Instant responses to someone
groups,social networks, networking applications who is remote from you, at no
conferencing, blogs and like Facebook or additional cost to your
vlogs. Google+ to exchange broadband fees.
information. Socialising.

Real-time Provides up-to-date


information information when picking
people up from an airport.
Companies can use real-time
information about customers
reactions to an advertisement
to improve the effectiveness
of the advert.

Commerce Banking, auctions, online


sales and purchases,
publishing.

2
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Government Applying for your first Allows users to carry out


provisional driving transactions seamlessly
license. (without the need to use
physical money) and globally.

Education Using the Microsoft


training package for
Windows 7.

Virtual learning Cost effective for the


environment school/college and allows the
(VLE) school/college to track the
submission of learners work.

Business Business networks,


(different types collaborative working,
of video conferencing
organisations)

Entertainment Playing a game with


other people over the
internet

3
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Download Music, films, new software, Makes purchasing easier and


services software upgrades, games more affordable.

Service
Types

2. Complete the table below to think about and record some of the services that you may use on a
daily basis and what you use them for?

Service Provider How do you use it? /


What do you use it for?

Email (E.g. Yahoo Mail)

Chat

Forum

Download
Services

Search engine

4
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Service Provider How do you use it? /
What do you use it for?

3. Find out what the following key terms mean in relation to the online world.

Profile -

Network of friends -

Online community -

Virtual world -

Chat -

5
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Chatroom -

Netiquette -

Plenary In pairs decide and write down which services are most important for:

Businesses? Schools and People wanting to


Colleges? communicate with
friends and family?

6
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Lesson 2 - Online Advertising


(Student Book A Pg 5,6)

Objectives

What is an Online services


What are the features of advertising online:
How do you capture attention in online advertising
How do you retain interest
What is pay-per-click

StarterWhat is online advertising? Give some examples.

...................................

1. Explain 3 types of online advertising commonly used.

Name:

Explanation:

..

Name:

Explanation:

..

7
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Name:

Explanation:

..

2. What do companies need to make sure that their online advertising is effective?

3. Use the space below to design a web page for your college. Include three types of
advertisement
(e.g. pop-up, web-banner) on your design.

Show in your design where you would include your advertisements and which type they should be.

Internet browser window web page

8
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Internet browser window web page

4. Why did you choose those types of advertisement?

Advertisement Reason for choosing

5. What is pay-per-click advertising?

9
PKI
BTEC 2012 Name: .
Unit 1 The Online World

PlenaryWhat is another name for online data storage?

...................................

Lesson 3 - Online Communication


(Student Book A Pg 10 - 13

Objectives

What is Online communication


What is Social networking
What is Instant messaging
What do you understand by Real-time communication (VoIP)
How do you use Blogs and Vlogs, Podcasts, Wikis
What are the Client and server roles

Starter What is an online community?

...................................

1. Match the following information exchanges to their correct descriptions.

These are sites which allows users to create and


Web logs
exchange really short text entries. A popular example
(blogs)
of this type of site is Twitter.
These are websites that provide information that
visitors to the site can extend and edit. They allow
Microblogging users to share information and are useful for
sites research. The best-known example of a wiki is
Wikipedia, the online encyclopaedia that can be
updated by contributors.
These are frequently updated online journals with
diary-like entries which allow people to express their
Wikis thoughts and feelings and give details of their daily
activities. Typically, a blog includes text, photos and
sometimes video.
Online communication within communities is
sometimes referred to as chat. Some of the large
Chatrooms interactive communities where people take part in the
same conversation or type of chat at the same time
are known as chatrooms.

10
PKI
BTEC 2012 Name: .
Unit 1 The Online World
2. Research and write a short description for each of the following key terms:

Electronic mail (e-mail)


.......................

Instant messaging (chat)


Newsgroup

.......................

Social networking

.......................
3. Conferencing

.......................

Blogs

.......................

Vlogs / Podcast

.......................

4. From discovering various online communications that are used online, what do you use?

............................................................

..................................................................................................................................................................................

...................................................................................................................................

5. What are the implications of online communication? Think about the positive and negative
aspects.

Positive:

...................................................

11
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Negative:
..................................................................................................................................................................................

..........................................................................................................................................................

6. What does VoIP stand for?


..................................................................................................................................................................................

..........................................................................................................................................................

7. What does VoIP do?


..................................................................................................................................................................................

..........................................................................................................................................................

8. What are the limitations of VoIP?

9. What are the benefits of VoIP?

12
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Plenary
1. Give 3 example of social media used online?
2. What does netiquette mean?

1.

...................................

2.

...................................

Lesson 4 - Online Documents


(Student Book A Pg 7 - 9)

Objectives
What are online documents
What is compression and expansion of files
What are the Advantages of using online software collaborative working, sharing
documents and automatic backup
How do you maintain control of documents (version control, levels of access and file
permissions including read only, read/write and full control)

Starter
a. What does upload mean?
b. What does download mean?
c. What is an algorithm?

a.

...................................

b.

...................................

c.

...................................

1. What is the most common method used to compress a file? What is the most popular program
used to achieve this?

13
PKI
BTEC 2012 Name: .
Unit 1 The Online World

2. What are the advantages of using online software packages?

A)

B)

C)

2. How does an automatic backup work?

...................................

...................................

3. Find out the meanings of these key terms

Version Control:

14
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Locked:

File Permissions:

4. Match the following file permissions to the correct sentence.

This allows users to retrieve a document,


read it, edit it, add a new document or
Read-only Access
delete or archive an existing document.

This allows a user to look at and read a


Read/Write Access document but not change it.

This allows the user to look at and read a


Full Control document but also to make changes to it.

5. Write down what permissions each of these people should have.

Person Permission

Computer Administrator

Teacher / Lecturer

Pupil / Student using a shared drive

15
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Lesson 5 Cloud Computing


(Student Book A Pg 14 - 15)

Objectives

What is online communication


What is the idea, use of and effects of:
o Cloud computing
o Ubiquitous computing

Starter What is cloud computing?

...................................

1. Name some well known hosting companies that provide cloud services.

...................................

Cloud storage is related to cloud computing and is where only the hosting company provides the storage,
access and retrieval faci

2. What are the benefits of cloud storage?

Benefit Reason / Description

16
PKI
BTEC 2012 Name: .
Unit 1 The Online World
3. What are the concerns that evolve around cloud storage?

Concern Reason / Description

4. What does ubiquitous mean?

...................................

5. Write down a definition for ubiquitous computer systems.

...................................

...................................

6. What are some examples of ubiquitous computing?

RFID stands for Radio Frequency Identification

17
PKI
BTEC 2012 Name: .
Unit 1 The Online World
6. What does RFID do? How does it work? (Use an example)

...................................

...................................

...................................

Plenary What are some futuristic examples of ubiquitous computing?


a.

...................................

b.

...................................

c.

...................................

Lesson 6 The Internet


(Student Book B Pg 1 - 3)

Objectives

What is Global network


What are points of presence and internet exchange points
What is internet infrastructure (clients, servers, routers)
How many internet connection methods are there (broadband, Wi-Fi, dial up)
What is internet protocols (TCP, IP, FTP)
What is the role of internet service providers (ISP) and the services they offer
What is bandwidth and transmission rates

18
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Starter When did the Internet first begin?

1. Match the following key terms to the correct abbreviations and descriptions.

Term Abbreviation Description


Point of Presence NAP The protocol which takes data from a users
application program and passes it to the IP
for transfer across the internet. The reverse
operation is performed at the destination
computer, i.e. the TCP reassembles the data
(from individual packets) and forwards them
to the users application program. The close
relation with the IP means that the terms are
usually used in combination, i.e. TCP/IP.

Network Access TCP A standard protocol which allows files to be


Point transferred between two computers on a
TCP-based network. It is commonly used to
download programs to your computer from
other servers and to upload web pages that
you have created to the server that is hosting
them on the internet.

Internet Protocol ISP An access point to the internet. Normally, it is


a location which contains all of the hardware
which allows internet users access to the
internet. An Internet Service Provider (ISP)
may operate several PoPs in their area to
allow good access to the internet.

Transmission FTP An interchange between


Control Protocol networks within the
internet. It allows ISPs to interconnect with
each
other

File Transfer IP Direct connection to the internet would be


Protocol very costly and so ISPs provide a cost-
effective gateway for people and
organisations to get onto the internet. In the
UK there are many ISPs, with some of the
most popular ones being BT (British
Telecom), Virgin Media and Sky.

Internet Service POP The protocol used to route packets of


Provider information across the internet

Internet Service Provider

19
PKI
BTEC 2012 Name: .
Unit 1 The Online World
An Internet Service Provider (ISP) is a company which provides access to the internet for individuals or other
companies (e.g. BT).

An ISP will have many servers to do different things depending on the size of the company and amount of
customers, e.g. one for outgoing email, one for incoming email, and may well have several for general net traffic,
users details, search engines, user web pages, etc.

Schools and Colleges?

20
PKI
BTEC 2012 Name: .
Unit 1 The Online World
2. Read Internet Infrastructure on Pg 2 careful and write the descriptions next to the correct piece of hardware.

Name:

Explanation:

Name:

Explanation:


..

21
PKI
BTEC 2012 Name: .
Unit 1 The Online World

3. Name three methods for connection to the Internet:

a: ..

b: ..

c: ..

4. What are the advantages and disadvantages of answer a above?

Advantages Disadvantages

5. What are the advantages and disadvantages of answer b above?

Advantages Disadvantages

6. What are the advantages and disadvantages of answer c above?

Advantages Disadvantages

Plenary What is meant by bandwidth and transmission rate?

...................................

...................................

22
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Plenary
a. What is a common format for compressing files?
b. What are the advantages of online documents?
c. What are the disadvantages of online documents?

a.

...................................

b.

...................................

c.

...................................

23
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Lesson 7 Worldwide Web
(Student Book B Pg 4 - 7)

Objectives

What is the worldwide web?


Web servers
Website structure and hyperlinks
Uniform Resource Locator (URL)
HyperText Transfer Protocol (HTTP) components and function of each component
HyperText Markup Language (HTML)
Internet browsers and their role
Search engines purpose and role in maintaining indexes of web pages

Starter Who developed the Worldwide Web? and in what year?

1. What is the WWW?

...................................

...................................

2. How is the Internet different from the WWW?

...................................

...................................
...................................

3. What does HTML stand for?


...................................

4. Name three example HTML tags and explain why they come in pairs.

URL Uniform Resource Locator

24
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Protocol: Hypertext Domain name Path


Transfer Protocol

http://www.w3schools.com/html/default.asp
Name the following URL parts for the following link.

http://www.iteach.org.uk/btec2012/unit13/task2/index.html

25
PKI
BTEC 2012 Name: .
Unit 1 The Online World

4. Name the following sections highlighted below.

Plenary What does HTML and URL stand for?

...................................

26
PKI
BTEC 2012 Name: .
Unit 1 The Online World
...................................

Lesson 8 Email
(Student Book B Pg 8 - 10)

Objectives
How do you send emails
What are the advantages and disadvantages of email and webmail
What is Simple Mail Transfer Protocol (SMTP)
What is Post Office Protocol (POP3)
What is Internet Message Access Protocol (IMAP)

Starter What is email short for?

1. Explain the store and forward system.

...................................

...................................

2. Explain the different fields highlighted in the picture below.

1.

2.

3.

1:

2:

3:

27
PKI
BTEC 2012 Name: .
Unit 1 The Online World

3. List five positive and negative aspects of using email.

Positive: Negative:

1 1

2. 2.

3. 3.

4. 4.

5. 5.

4. Explain the following email protocols used.

Acronym Protocol Description

SMTP

POP3

IMAP

5. Use the space below to draw a diagram showing how email works. Use some of the key terms you have
learn.

28
PKI
BTEC 2012 Name: .
Unit 1 The Online World

6. Explain how you would add an attachment to an email message. Use bullet points rather than writing a
sentence / paragraph.

...................................

...................................

...................................

...................................

Plenary
a. What does BCC stand for and how does it work?
b. Who invented email?

a.
...................................

b.
...................................

29
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Lesson 9 Data Exchange


(Student Book B Pg 11 - 14)

Objectives

What are transmission modes (simplex, half-duplex, duplex)


What hardware and software required for real-time communication
What is the role of a coder/decoder (CODEC)
What are the main features of transmission methods: fibre optic; wireless
(infrared, microwave, satellite); wired

Starter What is the role of a CODEC? What is a CODEC another name for?

1. Explain what VoIP stands for and how it works.


...................................

2. There are three transmission modes used in communication, these are shown in the diagram below. Explain
what each is and how it operates.

30
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Transmission Mode Description

Simplex

Half Duplex

Duplex (Full Duplex)

3. The table below shows the main transmission methods that are used. Complete the table to find out the key
details, benefits and limitations of each.

Wired
Type UTP / STP Coaxial Fibre Optic
Cable used

Max Speed

Max Distance

Benefits

Limitations

Example of use

31
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Wireless
Type Infrared Microwave Satellite
Cable used

Max Speed

Max Distance

Benefits

Limitations

Example of use

Plenary How many geostationary satellites are there in orbit and what do they provide?

...................................

...................................

32
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Lesson 10 Data Exchange 2


(Student Book B Pg 14 - 16)

Objectives

What are the main features of parallel, serial and bi-directional transmission
What is packet switching what is a packet? Benefits of packet switching
What is wireless networks concepts, structure and implications of wireless
networks including:
What are the components of a wireless network (router, access points, wireless
network adaptors)
What is client-side processing
What is server-side processing

Starter Explain the different between simplex, half duplex and duplex communications

1. Explain what serial and parallel transmissions are.

Serial: Parallel:

2. What is bi-directional transmission?

...................................

....................................

Client side processing is the use of a scripting language to create code on web pages which provide
interactivity. An example of this is a rollover action; this is where some code is triggered when your mouse is
moved over a particular part of the web page.

33
PKI
BTEC 2012 Name: .
Unit 1 The Online World
3. What are the benefits of client side processing?

....................................

4. What are the disadvantages of client side processing?

....................................

Server-side processing involves the use of scripts which reside and are run on another computer on the
internet (the web server). Information is submitted to a server which processes it to provide results in the
form of a web page. A good example of server-side processing is the submission of a search through a
search engine. The search engine matches the word or phrase against an index of website content on the
web server using scripts

5. What are the benefits of server side processing?

....................................

6. What are the disadvantages of server side processing?

....................................

7. Explain what USB is and what it is commonly used for.

....................................
.

Plenary Explain the differences between client and server side processing.

...................................

...................................

34
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Lesson 11 Data Storage


(Student Book B Pg 18 - 21)

Objectives
What is a Database structure (tables, records, fields, data types, relationships)
How do you use online databases
What is Database Management Systems (DBMS)

Starter What is meant by data storage?

1. What is a database structure made out of?

....................................

2. Explain what is meant be each of the following terms.

Table
....................................

Record
....................................

Field
....................................

Relationship
....................................

Data Type
....................................

3. Name the various data types that are used in databases.


I. ..
II. ..
III. ..
IV. ..

Databases use relationships to link different tables together as shown below.

35
PKI
BTEC 2012 Name: .
Unit 1 The Online World

4. What is a primary key?

...................................

5. What is a foreign key?

...................................

6. What kind of relationships can tables have between each other?

...................................

Online databases are databases which are accessible using a network, including the internet. They
are very different to local databases as they have to be accessed, and possibly updated, by millions
of users. Normally these databases will have thousands of rows of information. Usually information is
found in online databases by using a search engine.

7. How might an online database be used?

..

8. What is a DBMS? What does it do?

...................................

...................................

9. Name some common database management systems that are used:


I. ..
II. ..
III. ..

36
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Plenary What is the difference between a database and a database management system?

...................................

...................................

37
PKI
BTEC 2012 Name: .
Unit 1 The Online World

Lesson 12 Possible Threats to Data


(Student Book C Pg 1 - 4)

Objectives
What are the Security issues with regard to email (viruses, phishing,
identity theft)
What are the Security measures (encryption, passwords, access
restriction, firewalls, anti-virus software)
What is Malicious and accidental damage to data
Why do you need to Back up data
What is Data recovery
What are the Benefits and possible dangers of widespread social
networking and instant messaging
How do you Manage e-reputation
What is Online monitoring of individuals movements and
communications
What are the Current legislation (e.g. Data Protection Act

Starter What is malware?

Malicious Threats

Opportunist Virus

Threats to data

Trojan Phishing
1. Explain what each of the following threats are:

a. Opportunist

38
PKI
BTEC 2012 Name: .
Unit 1 The Online World

...................................

b. Viruses

...................................

c. Phishing

...................................

2. What is considered accidental damage?

...................................

39
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Computer security is an important aspect of online communication however all computer systems are under
continuous threat of attack and the threats are ever changing. It is impossible to provide 100% protection to a
computer system.

3. What are the possible consequences of an attack?

a.

...................................

b.

...................................

c.

...................................

d.

...................................

4. It is important to protect computer systems and their data. Match the following preventative actions to the
correct description.

Physical Barrier This is set up to intercept computer viruses before they can
become resident on the computer. The software can isolate
the virus, remove it and sometimes repair any damage.
Passwords These can be set up to allow individuals to have access to
only specific levels of an application and to prevent
unauthorized users from accessing particular data.
Access Levels This is used to codify data so that it cannot be read by
anyone who does not have the key to the code. An
algorithm, sometimes known as a cipher, is applied to the
data at the transmission end and the reverse is applied at
the reception end.
Anti-virus Software This is a piece of software that monitors all data arriving at
your computer from the internet and all data leaving your
computer. It stops anything that it thinks is harmful or
unwanted (such as viruses, spam, Trojan horses and
hackers).
Firewall These include turning off computers and locking offices
when the systems are unattended to prevent damage by
people, the environment (e.g. fire, flooding, electrical
interference) or theft.
Encryption Sequences of characters, known onlyto the computer user, which
allow access to a computer, network or application

40
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to Flash solid state storage devices or
magnetic tape at night. The tapes are stored safely in a separate place, so that they are not destroyed
by any disaster, which could destroy the master system (fire, earthquake, etc.).

5. What are the different types of backups available?



...................................


...................................

The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.

These threats can affect both your security and your reputation. Think about who has access to the
information you put online. Before you put photos on your social networking profile, think about who
might see them and whether you would mind. You might not want your employer or teacher to see
something that might be embarrassing or harmful to your reputation.

Use security settings to protect your privacy and identity. Remember that not everyone is who they
claim to be. Criminals access social networking sites trying to find out information about people. This
may put you at risk of identity theft and password theft if you have revealed too much information
about yourself. Be careful not to reveal information that you might use in a password, such as your
pets name.

6. What is identity theft?




...................................

7. How can you help prevent identify theft?




...................................
..

Plenary What is the Data Protection Act?



...................................


...................................

41
PKI