Sie sind auf Seite 1von 5

Lets communicate

1 DIFFERENCE BETWEEN FUNCTIONS AND FEATURES

A function has a purpose to do something


Features are extras on functions and are added to the functions
Difference between function and feature is that the feature is added onto
functions
E.G. Function: Texting
Features: SMS, MMS, Messenger

2 P.E FUNCTIONS
Sms
Mms
Internet
Colour screens

Pda (personal
data
assistance)
Fax
Camera
Bluetooth

Inferred

Memory

Radio

Mp3 player
Fm radio
Video games

Video calling
Gaming
Gps

E-mail
Media
Apps

3 FEATURES OF FUNCTIONS
Texting sms,
mms, qwerty,
alphanumeric.

Pda (personal
data
assistance)

Internet wifi,
3G, 4G,
electronic
communicatio
n, file transfer
protocol (FTP),
telnet, worldwide web
(www)
Colour screens
-

Fax speed,
printer, paper
size, paper
cutter, paper
feed,
autodialing.

Camera
pixels,
megapixels,
zoom.

Bluetooth
transfer
information
wirelessly.
Infrared
short distance
data,

Video games

Mp3 player
music storage

memory

Fm radio -

E-mail inbox,
outbox, sent
messages,
trash, folders.
Video calling

Gps camera,

Radio Epg,
pause rewind
and record
live radio, USB
connection,
multiple
alarms.

Gaming

4 DIFFERENT WAYS DIGITAL DEVICES CAN CONNECT TO


EACH OTHER

Wfi wireless, used around the house


Bluetooth -

5 GPS

What is it?
It stands for Global Positioning System.
GPS is a satellite based system that allows you to know your position
anywhere on Earth.
Why was it developed?
For the USA military to allow soldiers to know where they were regardless of
where there were.

How does it work?


Uses 'triangulation'. Distance from you and villain is calculated by machine.
Draw a circle to find the distance he could be from all directions. If more
machinery from different areas are used then another distance will be given.
Using all this you can make another circle which will eventually cross over
and pinpoint the location of the villain. Hence the word 'triangulation' - three
measurements can pinpoint a location.

So how do

satellites help?

If distance
between
yourself and at
least three
satellites
(preferably
four) can be
measured,
then your
location on
Earth can be
worked out. How accurately you can pinpoint your location depends on how
accurately you can measure the distances to the satellites. Commercial SatNav systems can measure to within a few metres.
Where is GPS used?
Uses:
* In cars - satellite navigation systems are becoming common
* Lorry Fleets: Used to track and locate vehicles
* Military - its original purpose, to help soldiers in the field.
* Shipping - to navigate the seas.
* Farming - to track crop growth and fertilizer application.
* Leisure - Mountaineers, hikers, explorers.
* Crime - offenders can now be 'tagged' with a GPS device to make sure they
stay where they should.
What is the future?
GPS has become so widespread in everyday life that some regions want to
control their own GPS for their citizens. For example the European Union
have been developing a similar system called Galileo.
Benefits

Drawback

Others will be able to locate your home to visit you

Stalkers will also be able to locate your home and


unwanted people will know how to find you

Fast Speed

Cellular devices can track other cellular device users

Helps improve mapping skills

Not cheap

You can be found easier if in danger or in an accident

People focus on GPS more than the road therefore more

accidents occur (GPS should be used as a back-up map)


It will lead you in the right direction

Needs good care

makes navigation

External power

Has panic buttons built-in

Needs batteries (handheld ones)

Plugs into your car cigarette lighter

6 STAY SAFE WITH INTERNET


http://
Green padlock in address bar
Green address bar
Copyright at bottom of page

7 THREATS TO PERSONAL INFORMATION

Computer Misuse Act


Computer misuse act = 1990 to stop unauthorised access from hackers attempting
to view and access or run programmes. Firewall stops hackers by filtering what
comes from internet to computer or network. Electronic infections: virus, email
virus, worm, Trojan horse. Antivirus prevents infection by regular updates.
Accessing unauthorised computers:
1. Access others work
2. Competitors designs
3. Delete files revenge
4. Steal money
5.
Act stops unauthorised access to computers (hacking)
1. Unauthorised access to computing material = offense
2. Accessing to commit offense or help others
3. Unauthorised modification to computer material
Hackers: Bored teenagers, Business rivals, thieves etc. (may be accident though)
Firewall stops others hacking. Filters data coming in through internet to
computer/network
Stops hackers by controlling computer and using machine as host to access or run
programs.
Electronic infections
Email Virus Attached to email. Virus copies itself and mail others in victims
address book
Trojan horse Computer program that claims to be one thing but does another
(deletes programs)
Virus Small piece of software that reproduces by attaching to other programs
Worm Small piece of software that uses networks and security holes to copy itself
and spread through network
Spyware/Adware Keep track of which adverts you click and send specific adverts
to your browser. Harmless but annoying
Phishing Attempt to gain personal info by deception (e.g. Send email pretending
to be bank)
Viruses: Copies itself without permission. Can damage data. Because it causes
computer code to be modified, it is illegal under computer misuse act. First British
virus writer prosecuted in 1995 for 18 months.
Prevent:
1. Anti-virus software updates regularly.
2. Dont download from unknown sources
3. Never run macros unless known source

4. Dont open attachments from people you dont know


Keeping data safe
Firewall Software that searches for viruses and removes any found
Encrypt Software that blocks access from unauthorised users
Online backup Data uploaded to online server somewhere else
Activity log Translate data into code that can only be retrieved by password or
key

8 COOKIES

Advantages of cookies:1. Cookies do not require any server resources since they are stored on the client.
2. Cookies are easy to implement.
3. You can configure cookies to expire when the browser session ends (session
cookies) or they can exist for a specified length of time on the client computer
(persistent cookies).
Disadvantages of cookies:1. Users can delete a cookies.
2. Users browser can refuse cookies, so your code has to anticipate that possibility.
3. Cookies exist as plain text on the client machine and they may pose a possible
security risk as anyone can open and tamper with cookies

9 COMMUNICATION PROTOCOLS

VoIP Voice over internet protocol (make telephone calls via internet) Headset and
speakers required. 3G connections good too.
POP3 Requires users to access emails via an internet mail account/mail deleted
from server when sent to client (useful when you only check email from one
computer).
IMAP4 Emails pushed to phone and copy of mail is kept on both server and client.
Can check email from multiple locations.

10 HEALTH ISSUES ASSOCIATED WITH DIGITAL DEVICES


Health Risk

Causes

Overuse injuries

Pressing buttons can


cause RSi especially for
thumbs

Obesity

Amount of time spent


playing on devices and
obesity is linked
Hours in same position
impacts posture and
spine

Muscle and joint problems

Eye strain

Eye become fatigued


when focusing at same
thing over same distance
for long time. Cause
blurry vision and
headaches

11 DIGITAL DIVIDE

Risks

Set sensible time limits


Take frequent breaks to stretch
Dont use same controller all the
time
Sensible time limits
Physical activity
Regular breaks to walk and
stretch
Adjust furniture to suit height
Use ergonomic chair
Adjust screen (contrast and
brightness)
Move furniture so light doesnt
fall on screen
Take gaze breaks: look at
objects in distance.

The digital divide refers to the gap between those who have access to technology
and those who do not.
The term 'digital divide' describes the fact that the world can be divided into people
who do and people who don't have access to - and the capability to use - modern
information technology, such as the telephone, television, or the Internet.

Impact of Global Digital Divide


Education: not being able to use digital devices does have an impact on an
individuals life when it comes to education. Children in countries such as Kenya
where they have limited/no access to the internet have a significant impact as they
arent able to access the specific information they need.
Academic Performances: According to the findings by Jerry Sun from University of
Southern California, computer skills are required for any college/university
student. With the lack of computer skills, students from low-income background
may not able to enter college/university or unable to finish even though accepted
by the college.
Are individuals who dont or cant use a digital device at a disadvantage?
DISADVANTAGES
Difficult to communicate with others
Harder to access information
ADVANTAGES
Less hassle
Brings back the feel of how life used to be
Less distracted
What do they miss out on?
Is it necessarily a bad thing?

Das könnte Ihnen auch gefallen