Beruflich Dokumente
Kultur Dokumente
Candidate No:
Target:
Aspirational target:
Learning Aim
A
Investigate online services and online communication
B
Investigate components of the internet and how digital
devices exchange and store information
C
Investigate issues that relate to operating online.
1
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Lesson 1 - Online Services
(Student Book A Pg 3, 4)
Objectives
2
PKI
BTEC 2012 Name: .
Unit 1 The Online World
3
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Service
Types
2. Complete the table below to think about and record some of the services that you may use on a
daily basis and what you use them for?
Chat
Forum
Download
Services
Search engine
4
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Service Provider How do you use it? /
What do you use it for?
3. Find out what the following key terms mean in relation to the online world.
Profile -
Network of friends -
Online community -
Virtual world -
Chat -
5
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Chatroom -
Netiquette -
Plenary In pairs decide and write down which services are most important for:
6
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Objectives
...................................
Name:
Explanation:
..
Name:
Explanation:
..
7
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Name:
Explanation:
..
2. What do companies need to make sure that their online advertising is effective?
3. Use the space below to design a web page for your college. Include three types of
advertisement
(e.g. pop-up, web-banner) on your design.
Show in your design where you would include your advertisements and which type they should be.
8
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Internet browser window web page
9
PKI
BTEC 2012 Name: .
Unit 1 The Online World
...................................
Objectives
...................................
10
PKI
BTEC 2012 Name: .
Unit 1 The Online World
2. Research and write a short description for each of the following key terms:
.......................
Newsgroup
.......................
Social networking
.......................
3. Conferencing
.......................
Blogs
.......................
Vlogs / Podcast
.......................
4. From discovering various online communications that are used online, what do you use?
............................................................
..................................................................................................................................................................................
...................................................................................................................................
5. What are the implications of online communication? Think about the positive and negative
aspects.
Positive:
...................................................
11
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Negative:
..................................................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
12
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Plenary
1. Give 3 example of social media used online?
2. What does netiquette mean?
1.
...................................
2.
...................................
Objectives
What are online documents
What is compression and expansion of files
What are the Advantages of using online software collaborative working, sharing
documents and automatic backup
How do you maintain control of documents (version control, levels of access and file
permissions including read only, read/write and full control)
Starter
a. What does upload mean?
b. What does download mean?
c. What is an algorithm?
a.
...................................
b.
...................................
c.
...................................
1. What is the most common method used to compress a file? What is the most popular program
used to achieve this?
13
PKI
BTEC 2012 Name: .
Unit 1 The Online World
A)
B)
C)
...................................
...................................
Version Control:
14
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Locked:
File Permissions:
Person Permission
Computer Administrator
Teacher / Lecturer
15
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Objectives
...................................
1. Name some well known hosting companies that provide cloud services.
...................................
Cloud storage is related to cloud computing and is where only the hosting company provides the storage,
access and retrieval faci
16
PKI
BTEC 2012 Name: .
Unit 1 The Online World
3. What are the concerns that evolve around cloud storage?
...................................
...................................
...................................
17
PKI
BTEC 2012 Name: .
Unit 1 The Online World
6. What does RFID do? How does it work? (Use an example)
...................................
...................................
...................................
...................................
b.
...................................
c.
...................................
Objectives
18
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Starter When did the Internet first begin?
1. Match the following key terms to the correct abbreviations and descriptions.
19
PKI
BTEC 2012 Name: .
Unit 1 The Online World
An Internet Service Provider (ISP) is a company which provides access to the internet for individuals or other
companies (e.g. BT).
An ISP will have many servers to do different things depending on the size of the company and amount of
customers, e.g. one for outgoing email, one for incoming email, and may well have several for general net traffic,
users details, search engines, user web pages, etc.
20
PKI
BTEC 2012 Name: .
Unit 1 The Online World
2. Read Internet Infrastructure on Pg 2 careful and write the descriptions next to the correct piece of hardware.
Name:
Explanation:
Name:
Explanation:
..
21
PKI
BTEC 2012 Name: .
Unit 1 The Online World
a: ..
b: ..
c: ..
Advantages Disadvantages
Advantages Disadvantages
Advantages Disadvantages
...................................
...................................
22
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Plenary
a. What is a common format for compressing files?
b. What are the advantages of online documents?
c. What are the disadvantages of online documents?
a.
...................................
b.
...................................
c.
...................................
23
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Lesson 7 Worldwide Web
(Student Book B Pg 4 - 7)
Objectives
...................................
...................................
...................................
...................................
...................................
4. Name three example HTML tags and explain why they come in pairs.
24
PKI
BTEC 2012 Name: .
Unit 1 The Online World
http://www.w3schools.com/html/default.asp
Name the following URL parts for the following link.
http://www.iteach.org.uk/btec2012/unit13/task2/index.html
25
PKI
BTEC 2012 Name: .
Unit 1 The Online World
...................................
26
PKI
BTEC 2012 Name: .
Unit 1 The Online World
...................................
Lesson 8 Email
(Student Book B Pg 8 - 10)
Objectives
How do you send emails
What are the advantages and disadvantages of email and webmail
What is Simple Mail Transfer Protocol (SMTP)
What is Post Office Protocol (POP3)
What is Internet Message Access Protocol (IMAP)
...................................
...................................
1.
2.
3.
1:
2:
3:
27
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Positive: Negative:
1 1
2. 2.
3. 3.
4. 4.
5. 5.
4. Explain the following email protocols used.
SMTP
POP3
IMAP
5. Use the space below to draw a diagram showing how email works. Use some of the key terms you have
learn.
28
PKI
BTEC 2012 Name: .
Unit 1 The Online World
6. Explain how you would add an attachment to an email message. Use bullet points rather than writing a
sentence / paragraph.
...................................
...................................
...................................
...................................
Plenary
a. What does BCC stand for and how does it work?
b. Who invented email?
a.
...................................
b.
...................................
29
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Objectives
Starter What is the role of a CODEC? What is a CODEC another name for?
2. There are three transmission modes used in communication, these are shown in the diagram below. Explain
what each is and how it operates.
30
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Transmission Mode Description
Simplex
Half Duplex
3. The table below shows the main transmission methods that are used. Complete the table to find out the key
details, benefits and limitations of each.
Wired
Type UTP / STP Coaxial Fibre Optic
Cable used
Max Speed
Max Distance
Benefits
Limitations
Example of use
31
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Wireless
Type Infrared Microwave Satellite
Cable used
Max Speed
Max Distance
Benefits
Limitations
Example of use
Plenary How many geostationary satellites are there in orbit and what do they provide?
...................................
...................................
32
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Objectives
What are the main features of parallel, serial and bi-directional transmission
What is packet switching what is a packet? Benefits of packet switching
What is wireless networks concepts, structure and implications of wireless
networks including:
What are the components of a wireless network (router, access points, wireless
network adaptors)
What is client-side processing
What is server-side processing
Starter Explain the different between simplex, half duplex and duplex communications
Serial: Parallel:
...................................
....................................
Client side processing is the use of a scripting language to create code on web pages which provide
interactivity. An example of this is a rollover action; this is where some code is triggered when your mouse is
moved over a particular part of the web page.
33
PKI
BTEC 2012 Name: .
Unit 1 The Online World
3. What are the benefits of client side processing?
....................................
....................................
Server-side processing involves the use of scripts which reside and are run on another computer on the
internet (the web server). Information is submitted to a server which processes it to provide results in the
form of a web page. A good example of server-side processing is the submission of a search through a
search engine. The search engine matches the word or phrase against an index of website content on the
web server using scripts
....................................
....................................
....................................
.
Plenary Explain the differences between client and server side processing.
...................................
...................................
34
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Objectives
What is a Database structure (tables, records, fields, data types, relationships)
How do you use online databases
What is Database Management Systems (DBMS)
....................................
Table
....................................
Record
....................................
Field
....................................
Relationship
....................................
Data Type
....................................
35
PKI
BTEC 2012 Name: .
Unit 1 The Online World
...................................
...................................
...................................
Online databases are databases which are accessible using a network, including the internet. They
are very different to local databases as they have to be accessed, and possibly updated, by millions
of users. Normally these databases will have thousands of rows of information. Usually information is
found in online databases by using a search engine.
..
...................................
...................................
36
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Plenary What is the difference between a database and a database management system?
...................................
...................................
37
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Objectives
What are the Security issues with regard to email (viruses, phishing,
identity theft)
What are the Security measures (encryption, passwords, access
restriction, firewalls, anti-virus software)
What is Malicious and accidental damage to data
Why do you need to Back up data
What is Data recovery
What are the Benefits and possible dangers of widespread social
networking and instant messaging
How do you Manage e-reputation
What is Online monitoring of individuals movements and
communications
What are the Current legislation (e.g. Data Protection Act
Malicious Threats
Opportunist Virus
Threats to data
Trojan Phishing
1. Explain what each of the following threats are:
a. Opportunist
38
PKI
BTEC 2012 Name: .
Unit 1 The Online World
...................................
b. Viruses
...................................
c. Phishing
...................................
...................................
39
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Computer security is an important aspect of online communication however all computer systems are under
continuous threat of attack and the threats are ever changing. It is impossible to provide 100% protection to a
computer system.
a.
...................................
b.
...................................
c.
...................................
d.
...................................
4. It is important to protect computer systems and their data. Match the following preventative actions to the
correct description.
Physical Barrier This is set up to intercept computer viruses before they can
become resident on the computer. The software can isolate
the virus, remove it and sometimes repair any damage.
Passwords These can be set up to allow individuals to have access to
only specific levels of an application and to prevent
unauthorized users from accessing particular data.
Access Levels This is used to codify data so that it cannot be read by
anyone who does not have the key to the code. An
algorithm, sometimes known as a cipher, is applied to the
data at the transmission end and the reverse is applied at
the reception end.
Anti-virus Software This is a piece of software that monitors all data arriving at
your computer from the internet and all data leaving your
computer. It stops anything that it thinks is harmful or
unwanted (such as viruses, spam, Trojan horses and
hackers).
Firewall These include turning off computers and locking offices
when the systems are unattended to prevent damage by
people, the environment (e.g. fire, flooding, electrical
interference) or theft.
Encryption Sequences of characters, known onlyto the computer user, which
allow access to a computer, network or application
40
PKI
BTEC 2012 Name: .
Unit 1 The Online World
Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to Flash solid state storage devices or
magnetic tape at night. The tapes are stored safely in a separate place, so that they are not destroyed
by any disaster, which could destroy the master system (fire, earthquake, etc.).
The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has access to the
information you put online. Before you put photos on your social networking profile, think about who
might see them and whether you would mind. You might not want your employer or teacher to see
something that might be embarrassing or harmful to your reputation.
Use security settings to protect your privacy and identity. Remember that not everyone is who they
claim to be. Criminals access social networking sites trying to find out information about people. This
may put you at risk of identity theft and password theft if you have revealed too much information
about yourself. Be careful not to reveal information that you might use in a password, such as your
pets name.
41
PKI