Operating Online

HideShow resource information
  • Created by: Curlot
  • Created on: 01-03-14 15:45
View mindmap
  • Operating Online
    • The Internet
      • Huge network
      • Same Protocol - TCP/IP
        • Connection needs a Network Interface Card (NIC)
  • Same Protocol - TCP/IP
    • Connection needs a Network Interface Card (NIC)
  • Cost
    • Download Limits
      • Email and Web space
    • Isp
      • The Internet
        • Huge network
      • Security
        • Reliability and support
  • Bandwidth
    • Isp
      • Security
        • Reliability and support
  • Internet Use
    • Operating Online
    • Email
      • Internet Use
      • Business on the Internet
        • Email,IM,VoIP
          • Business on the Internet
          • Video Conferencing
            • Security Measures
              • Username
                • Security Measures
                • Authenictcate
                  • Password
                    • Username
                  • Personal Spaces
                    • Private
                    • Think before you share
                  • Don't befriend everyone
                    • Personal Spaces
                      • Private
                      • Think before you share
                  • Info Misuse
                    • Overt
                      • Know it's collected
                        • Submitting Data for Social Network
                    • Don't Know it's collected
                      • Trojans
                  • Preventing Misuse
                    • Legislation
                      • The Data Protection Act 1998
                        • Secure
                        • Longer than necessary
                          • Without our Consent
                    • Copyright
                      • Original Work
                        • Infringment
                          • Prosecuted
                    • Controlling Cookies
                    • Phishing: Don't Be Fooled
                      • Preventing Spyware
                    • More Data
                      • The Data Protection Act 1998
                        • Secure
                        • Longer than necessary
                          • Without our Consent
                    • Unauthorised access
                      • The Computer Misuse Act 1990
                        • Legislation
                      • Unauthorised Modification
                        • Unauthorised access
                          • The Computer Misuse Act 1990
                        • With Intent

                          Comments

                          ThomasDaly

                          noice

                          Mxrix_1x

                          amazing

                          DannyMartin420

                          this is very usefull thanks !!!!!

                          Keylan

                          Ayesha + Matthew

                          Similar ICT resources:

                          See all ICT resources »See all Operating online resources »