IT

?
View mindmap
  • IT REVISION
    • Mobile Phones
      • Multifunctional
        • Having the ability to do many different things using the same device
      • Smart Phone
        • A phone offering advanced features, e.g. the ability to send emails, surf the internet.
    • Computers
      • Processor (CPU)
        • The brains of the computer-where calculations are carried out. The higher the processing speed, the faster the computer but the more power it uses.
      • Memory
        • Usually refers to RAM which is the temporary memory that the computer uses. The higher the RAM the more programs you can have open at one time and the faster they will respond.
      • Hard drive size
        • The primary storage of the computer. The bigger the hard drive, the more data can be stored.
      • Wireless enabled
        • This allows the device to pick up WiFi signals, enabling you to connect to a network.
      • Optical Drive
        • This allows you to install software, listen to music and watch films with ease.
    • Peripherals
      • Input Devices
        • Take new information and put it into the computer, ready for the computer to process, e.g. keyboard, mouse, scanner, microphone.
      • Output Devices
        • Allow you to view information after it has been processed, e.g. printer, speaker, monitor.
      • Storage devices
        • Allow you to store data so that it can be accessed by the computer, e.g. hard drive, CD-R, DVD-R, flash memory cards.
    • Socialising
      • Instant Messaging (IM)
        • Talking to someone in real time by typing and receiving messages
        • Advantages
          • Quick and easy communication in real time
        • Disadvantages
          • Need internet access and if the connection is slow it could impact on the real-time feature
      • VoIP
        • This is similar to IM on a computer, but sound rather than text is sent.
    • The internet as a work tool
      • Virtual Learning Environment(VLE)
        • Students can access their schools VLE where they can find work that teachers have put up.
      • E-mail
        • A popular method of communication that involves sending messages over a communications network, such as the internet between computers and other devices.
      • Protocols
        • A set of rules used by computers to communicate with each other across a network. Without protocols, computers wouldn't be able to communicate effectively e.g. IMAP 4 and POP 3
      • User Generated websites
        • These websites, also known as wikis are made by people working collaboratively.
    • Internet Safety
      • Virus
        • A program that can infect a computer without the user knowing. They can damage the systems settings and memory, generating error messages and causing the computer to malfunction.
      • Fraud
        • tricking someone for personal gain or to damage them.
      • ICT and the Law
        • Data protection act 1998
          • This law regulates how personal information is used and protects against misuse of personal details.
        • Computer misuse act 1990
          • This law protects people from: unauthorised modification of computer material e.g. sending viruses to people on purpose.
      • Cookies
        • A small file which stores information related to your internet activity then reports it back to the website server.
      • Spam
        • Unwanted email such as chain letters and unsolicited commercial email.
      • Identity Theft
        • This takes place when someone collects personal information about you and uses it for malicious or criminal purposes.
    • Connecting to the internet
      • Broadband
        • High speed connection to the internet
      • Bandwidth
        • The amount of data that can fit through an internet connection.
    • Networks
      • IP (internet protocol) address
        • The personal address of your computer.
      • Ethernet cable
        • The original method of connecting computers. The cable is connected to the computers' network interface cards by plugs.
      • Powerline
        • A method for creating a home network which uses the mains power circuits in the house for data transmission.
    • Software choices
      • Locally installed software
        • Where you pay a one off fee to own the software so you are able to use it for as long as you want.
      • Leasing the software
        • You can rent the software from a company and pay for it each month instead of all in one go.
      • Software as a service
        • (SaaS) you can pay for the software as you would like to use it, similar to 'pay as you go' on mobile phones.
    • Viral marketing
      • A marketing strategy that encourages people to pass on a marketing message to their friends. it uses interesting and entertaining content that people will want to share. E.g. the Cadburys Gorilla
    • Online shopping
      • Advantages
        • Online stores are always open, there is a far greater choice online, you can compare prices for the item you want to buy using price comparison websites, for some people travelling to the shops is difficult so it is a great advantage to shop from home and get the items delivered.
      • Disadvantages
        • You have to pay for delivery which sometimes can be more expensive than the product you are buying, also you cannot see or try the products you are buying.
    • Paying online
      • Online banking
        • a service offered by banks that allows account holders to view their information online and carry out various financial transactions.
      • Third-party payment processor
        • A business that offers customers an alternative fast, safe method to pay for online goods and services.
    • Online fraud
      • Trojan
        • A program that appears legitimate but which performs harmful activity when it is run.
      • Phishing
        • A form of internet fraud that aims to steal information such as credit card details, usernames and passwords.
      • Card not present fraud
        • When buying goods online the card is not present at purchase so you have to give lots of the cards details. This makes it easy for criminals to commit fraud as all they need are your personal details and the security code on the back of the card.

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Computer systems and mobile technologies resources »