100% found this document useful (1 vote)
89 views

1-ICT Topic 3

The document provides an overview of the Internet and how it functions at a basic level. It discusses how the TCP/IP protocol allows computers around the world to communicate over the Internet using a Network Interface Card. It also notes that the World Wide Web is the most widely used service on the Internet and uses the HTTP protocol to access web pages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
89 views

1-ICT Topic 3

The document provides an overview of the Internet and how it functions at a basic level. It discusses how the TCP/IP protocol allows computers around the world to communicate over the Internet using a Network Interface Card. It also notes that the World Wide Web is the most widely used service on the Internet and uses the HTTP protocol to access web pages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

(NIC).

To connect to the Internet you need a Network Interface Card

-Uses HTTP protocol to allow users to access web pages

(WWW)
Most widely used service on the Internet= World Wide Web

send data to each other.


same protocol- TCP/IP- so that they can communicate and
computers all over the world. All of the computers use the
The Internet is a huge network that links networks of

1 of 11
The Internet

2 of 11
Internet Use (1)

Internet Use:

Blogs- Online diaries, Post and share experiences


Social Networking- Websites that allow chat, messaging,
email groups and file sharing
Voice over Internet Protocol (VoIP)- Need fast Internet
connection
Online Albums- Photo albums hosted on a website, allows
you to share and back up photos
Email- Sending messages, can access using laptops,
phones, etc...
Instant Messaging (IM)- 'Talking' in real time by typing
messages, helps collaboration
to face
Disadvantages- people don't communicate as well as when face
Advantages- reduces need for travel (lower costs)
Video conferencing- two-way audio and video transmissions

Disadvantages- Possible security issues


Advantages- Don't need to buy multiple software licences
accessed anywhere
Cloud computing- storing software and data so it can be

Disadvantages- Possibility of over reliance/misuse


Advantages- Aid collaboration
Internet
Email, Instant messaging, VoIP- ways of communicating over the

Business on the Internet

3 of 11
Internet Use (2)

4 of 11
Internet use (3)

Learning on the Internet

Virtual Learning Environment (VLE)- web-based system allowing students, etc...


to communicate
Advantages- students can access tasks/resources uploaded by teachers
Disadvantages- cannot access without Internet connection

News Websites
Advantages- use RSS feeds to see latest stories, search archives to find old
stories
Disadvantages- posssible over-relaince rather than using a number of sources

Email, instant messaging, VoIP


Advantages- improved/quicker communication
Disadvantages- possible over-reliance/overuse

User-generated websites (Wikis)- websites to which people can add their own
content
Advantages- up-to-date information with lots of peoples inforamtion
Disadvantages- anyone can add content, may be inaccurate/biased
Think before you share anything
Check and use your privacy settings
Don't befriend everyone
Make online albums private
Text and weblinks, Likes/Dislikes, New feeds
networking and personal VLE pages. You can add- Photos, Personal Information,
You can design your own websites and blogs. You can also personalise your social
Forums
Online photo albums
Personal websites
Personal page on VLE/work social media platforms
Social networking sites
Blogs
Types of personal space:
6 of 11
Personal spaces
5 of 11
Security measures
When you buy goods online or join a social networking site
you have to set up an account with a username and password.
You use the password to prove your identity.
Security questions are one example of a challenge-response
test. Some sites (e.g. banks) require you to answer security
questions as well as your password. This can be used to
identify yourself if you've forgotten your password. 
Sites use CAPTCHA which is used to check that the form is not
being completed automatically by a software. There is no
software that can read the letters displayed.
Government sells personal details to private companies.
Organisations make money by selling personal information, e.g. the

make money by pretending to be that person.


If fraudsters find out people's personal details they can use them to

Identity Theft

commit fraud
Hackers can find out your personal/financial information- use it to
Trojns record all of your key strokes/take pictures of your screen
computer
Hackers can install software called Trojaans to spy on your

Spyware

Covert data collection- You don't know the data is being collected

Overt data collection- You know the data is being collected

7 of 11
Information misuse

8 of 11
Preventing misuse

Cookies

Cookies track your browsing activity and are a major privacy concern. Users control
cookies by:

Setting their browsers to accept/reject cookies


Setting their browser to prompt them each time a cookie is offered

Any website that collects info from its customers should have a privacy policy
describing the website's use of cookies.

Phishing

Phishing emails are sent to get information out of people. Banks say they will never
conatct you by email asking for secure details.

Look out for:

Impersonal greeting, Threat, URL that doesn't take you to the bank website when
clicked, Request for personal information.
you're not sure about
Never click 'agree/ok' to close the window of a website
Read all security warnings 
Only download programs from websites you trust

-Surf and download more safely:

programs
-Be wary of downloading free music and movie file-sharing
-Install antispyware protection software
downloaded to your computer
-Use a firewall to prevent spyware being remotely

9 of 11
Preventing spyware

10 of 11
Legislation

Data Protection Act and Computer Misuse Act are designed to protect our privacy.

Data Protection Act 1988 (Put in place to protect us. Companies holding our data are
required by law):

To keep it secure
Not to ask for more data than necessary
Not to keep data for any longer than necessary
To keep data accurate and up to date
Not to use data for any other purpose without our consent

Computer Misuse Act (With the widespread use of the Internet it is now easier to
remotely log into a network or someone's computer to steal/corrupt data). The
computer misuse act lists three levels of crime:

Unauthorised access to computer material


Unauthorised modification of computer material
Unauthorised access to a computer with intent
11 of 11
Copyright
Copyright, Designs and Patents Act protects people's original work. 
All original work is copyright. The person who creates a work owns the
copyright, they are the only person who has the right to reproduce/adapt/sell it
Copyright owners can use Creative Commons licenses to allow certain uses of
their work
Why bother?
People spend a lot of time and money creating these materials. They deserve to
be paid.
If not paid then they will not be able to afford to create any more.
Consequences of illegal file sharing
You can be prosecuted
Your internet service provider may prevent you from using the Internet
You could be sent to prison
It has a huge impact on the music/film industries.

You might also like