Topic 3 UNIT 1 ICT
Topic 3 UNIT 1 ICT
Internet
- Network of worldwide networks
- Use TCP/IP network protocols to facilitate data transmission/exchange
Routing
- Process - Sending internet packets - Between networks
Domain Name
- IP # replaces w/static names = domain names
- Accessible to all internet connected devices
A domain name is an Internet resource name that is universally understood by Web
servers and online organizations and provides all pertinent destination information.
To access an organization’s Web-based services, website users must know the
precise domain name.
Domain Name Servers (DNS)
- Internet's phone book - Maintains name directory
- Translates to IP address.
The domain name system (DNS) is a naming database in which internet domain
names are located and translated into Internet Protocol (IP) addresses. The domain
name system maps the name people use to locate a website to the IP address that a
computer uses to locate that website
Propagation
= Takes 12-36 hrs for DNS update/access info
Structure of Internet
- One internet connected computer interact w/another
- W/ help of protocol stacks =TCP/IP stacks - Built into OS
- 4 layers :
Application protocol
Transmission protocol
Internet protocol
Hardware
- Layers convert/send info between IP addresses - Over Internet
3.1.2 Understand the features, functions, impact, and potential of the World
Wide Web:
World Wide Web (WWW)
- Search tool - Helps find/retrieve info - From web
- Using links to other sites/documents
WWW Features
Easy to use
- Can immediately understand
Universal access
- Open design - Build web browser on range of devices
Search capabilities
- Quickly find what looking for amongst millions pages
WWW Functions
Collect info Send info
Positive Impacts WWW
Instant communication
- Communication both receiver/sender oriented.
Brings people together
- Can keep in touch - Meet new ppl
Negative impacts WWW
Spread misleading/false info
- Damage unsuspecting info users outlook
Addictive
- Spending too much time on socials - Loss productivity
Questions
Hilmi Megat has a personal website.
Hilmi uses the website to tell people about the places that he has travelled to.
(a) The website’s domain name is www.hilmi-megat.com and the IP address is
203.0.113.15.
When someone wants to visit the website, they enter the domain name into
their browser address bar.
Describe how the connection is made to IP address 203.0.113.15.
Answer
• Find IP address:
Browser checks cache for previously used connection information (1)
Browser connects to Domain Name Service (server) / DNS (server) / Domain
Name Server (1)
DNS server has database/tables of domain names and IP addresses (1)
DNS server looks up IP/converts name to IP (1)
• IP address sent to browser (1)
• IP address used to connect to website (host) (1)
(e) Gathii’s blog and the cloud storage sites are part of the world wide web.
One of the main features of the world wide web is hypertext.
Explain what hypertext is.
Award one mark for each point up to a maximum of three marks for a linked
explanation.
• non-linear text
• contains links (from text / graphics, video) to other text / graphics, video / sound
• link can go to whole file/document or specific location within the file/document
• links can be anywhere on internet / world wide web
• providing the ‘web strands’ that create the world wide web
Example
• Hypertext provides a link from one web page/document/text to another (1) the
second text can be anywhere on the internet (1) this type of link forms the ‘web’ of
the world wide web (1)
Hyperlinks are examples of non-linear text (1) which means that they hold links to
pieces of text that do not immediately follow the hyperlink text (1) these links are
what join up the world wide web/internet (1)
• Hypertext links a piece of text to another piece of text (1) the second piece of text
can be anywhere on the internet (1) and the link can be to any place within the
second piece (1)
3.1.3 Understand the difference between static and dynamic web page
content and the need to use the different types.
Dynamic Site
• Written = server side scripting
"energetic or forceful"
- Content called in - By scripting lang - From orgere files/database
*Not very accurate by quiz
Questions
Hilmi uses a web-hosting company to host and support his website.
The company provides software tools to make both static and dynamic web
pages.
(b) Give three differences between static and dynamic web pages.
Award one mark for each difference up to a maximum of three marks.
• static page content is fixed, dynamic alters with user actions (1)
• dynamic pages use a fixed format/template while static pages can all be different
(1)
• static written in HTML, dynamic written in a server-side scripting
language/PHP/ASP/JSP
(1)
• static code/HTML is read/displayed by the browser/client computer, dynamic is a
server-side process (1)
• static content (usually) held in one location, dynamic page content called (by script)
from other files/data source(s) (1)
• dynamic, easy to add new features, such as a data feed, to an existing web page
(whereas the content for static pages is hard coded) (1)
• database can be used by dynamic pages to supply content (whereas the content
for static pages is hard coded) (1)
Hilmi’s website only has static web pages. He is thinking of converting the
website into a dynamic one.
(c) Discuss the advantages of using dynamic web pages instead of static web
pages. (6)
Responses should be in relationship to the context of the question (advantages of
dynamic web pages)
responses may look at one aspect in depth or cover elements of more than one.
Ease of use by web author Hilmi:
• easy to create structured / organised pages
• does not need to know HTML
• no need to recode pages to change content
• can connect to a database / data source allowing the use of a content management
system
• no or reduced costs / time when changing page content
Responsive to users:
• pages are filled / sorted according to user actions
• interactive actions allow help user engagement
• able to respond to / accommodate different screen sizes / resolutions
Other:
• content can respond to:
o cookies
o time of day
o locational information
• better for SEO
(e) Some of Julie’s websites use scripts to make them interactive.
These may be run as client-side scripts or server-side scripts.
(i) State the difference between a client-side script and a server-side script.
Client-side scripts run on the client's/visitor's computer, server-side scripts run on the
server (1)
(ii) Explain one reason why a website owner might prefer to use client-side
scripts rather than server-side scripts.
Award one mark for each point up to a maximum of two marks for a linked
explanation.
• this reduces the load on the server (1)
• saving money/resources/bandwidth/processing power on the server (1)
• reducing the delay/lag when data is moved / visitors get a faster response to their
actions (1)
• giving the client/visitor a better/improved service / increasing client/visitor
satisfaction (1)
Examples:
(Using client side scripts):
• gives a reduced server load (1) gives a faster service to clients (1)
• saves money (1) by reducing how much the server needs to do (1)
• reduces lag for the client (1) because less bandwidth is being used (1)
3.2.2 Understand the security risks to personal data stored online and
methods of protection.
It means that any data that can be used to identify or recognise somebody is classed
as personal data. Sometimes the data has been manipulated so that it does not
allow an individual to be identified. The EU’s definition goes on to suggest that any
data which can be reconstituted so that it does enable an individual to be identified
can also be classed as personal data. So, even if personal data has been de-
identified, encrypted or pseudonymised, it is still classed as personal data.
Examples of personal data as outlined by the EU are:
» a name and surname
» a home address
» an email address, such as [email protected]
» an identification card number
» location data (for example from the location data function on a mobile phone)
» an IP address
» a cookie ID
» the advertising identifier of your phone
» data held by a hospital or doctor, which could be a symbol that uniquely identifies a
person.
Firewall
Firewalls are designed to prevent unauthorised network access. Organisations which
store personal data tend to have several computers that form networks, many of
which are connected to the internet. Without a firewall, these computers can be
accessed by unauthorised users through the internet. Firewalls examine data coming
into the network to see if it is allowable. It examines data packets and breaks them
down into smaller pieces of information such as the IP address they came from. An
IP (internet protocol) address is a combination of numbers that identifies each
computer in a network. If it is an IP address that is not allowed, the firewall can block
that traffic. It can prevent certain computers from gaining access to the network.
Firewalls do not always prevent hackers from accessing networks, however.
Although a hacker’s computer is prevented from accessing the network, the hacker
could physically steal a computer that is permitted to access the network. More
likely, they can use software which can change the IP address of their computer to
one which is acceptable to the firewall.
Penetration testing
A penetration test, sometimes referred to as a ‘pen test’, is when companies employ
somebody to deliberately attack their computer network. They do this so that the
authorised ‘hacker’ will identify the weaknesses in their system’s security and the
company can then take measures to improve it if necessary. Basically, it is a way to
find out how easy it is to access a computer network and how well the measures
being taken to protect the data are working and, if necessary, improve them. The
purpose of doing this is to enable the company to secure personal data from illegal
hackers who will attempt to gain unauthorised access to the system.
Network policies
Network policies are sets of rules that allow companies to choose who is allowed to
access their computer network and control their use of the network once they have
gained access. Most companies now use the internet to carry out their business
transactions, and as a consequence their computer networks have become
vulnerable to attack. These attacks can allow competitors to gain knowledge of their
operations; they can result in data being destroyed or provide access to any
personal data that is stored. When workers join a company, they are normally
required to sign an agreement, such as an acceptable use policy. This specifies what
type of use is acceptable and what is not. They have to agree not to use the network
for illegal, unethical or distracting non-workrelated activities, such as downloading
copyrighted material or spending time on social networking sites to communicate
with friends. While not necessarily preventing hackers from outside the organisation
attacking the network, it does help to limit what employees might be tempted to do
with personal data.
Softwre Updates
3.2.3 Understand what a digital footprint is and the positive and negative
aspects of these.
A digital footprint, sometimes called a digital dossier, is the body of data that exists
as a result of actions and communications online that can in some way be traced
back to an individual.
Digital footprints are sometimes broken down into active and passive data traces.
Active data traces are the ones that the user leaves intentionally. Facebook, Twitter
and blog posts, social network connections, image and video uploads, email, phone
calls and chats are among the ways people create active digital footprints.
Passive data traces connected to an individual are left by others or gathered through
activities that the user does without purposefully putting out data. Website visits and
actions, searches and online purchases are among the activities that add passive
data traces to a digital footprint.
A digital footprint is relatively permanent and once the data is public -- or even semi-
public, as may be the case with Facebook posts -- the owner has little control over
how it will be used by others. For that reason, a major focus of digital footprint
management (DFM) is caution about online activities to control the data that can be
gathered in the first place.
Pros:
Fraud or legal issues can more easily be detected
Personalization (like suggested products or related advertising) serves to add value
to our use of the Internet
Companies can more easily offer incentives based on interests and needs,
sometimes resulting in cost savings
Cons:
Personal data can be used to generate revenue without our knowledge
It can be annoying and distracting to be constantly inundated with advertisements
and information
Purchase behavior data may be used as a basis to reduce credit limits or increase
interest rates
Exam Questions
Sanjeev writes short stories for magazines. He does not have a permanent
position and only gets paid when a story is published. Some stories are
commissioned by a magazine’s editor, others are submitted in the hope that
they will be accepted and published.
Sanjeev researches material for his stories by using the internet. He also has
an active social media presence for his work and personal life.
By using the internet, Sanjeev has generated both an active and a passive
digital footprint.
Evaluate the advantages and disadvantages for Sanjeev of the digital
footprints that he has generated.
You should consider:
• the impact on Sanjeev’s working and personal life
• how Sanjeev should manage his footprints going forward.
(12)
Responses should be in relationship to the context, advantages and disadvantages
to Sanjeev of the digital footprints that he has generated.
Active footprint (generated when Sanjeev deliberately releases / shares personal
data, e.g. on social media).
Advantages:
• editors can more easily find Sanjeev to
o offer work
o see examples of his writing
o see what styles, genres etc. he can write in
• helps protect Sanjeev from:
o fraudulent activity
o plagiarism / claims of plagiarism
o other legal issues such as copyright
• allows companies to personalise Sanjeev’s visits to their sites, for e.g. special
offers, suggested products.
Disadvantages:
• adverts / offers may be based on Sanjeev’s research and not be wanted for his
everyday life
• personal data can be monetised without Sanjeev’s knowledge / permission
• companies may ‘personalise’ by increasing prices based on a perception of
Sanjeev’s wealth / status
• analysis of an active footprint can reveal more information than Sanjeev had
intended to share
• privacy problems
12
Passive footprint (generated when Sanjeev visits sites, performs transactions. e.g.
cookies, logfiles).
Advantages:
• enhanced experience, e.g. search fill, location awareness
• helps protect Sanjeev from:
o credit card fraud
o attempts to log in to his accounts, e.g. email, shopping
Disadvantages:
• privacy problems
• no control over what is collected
• information may end up in wrong hands, e.g. credit card numbers, account
numbers
• embarrassing / inconvenient material may be collected
• may impact on non-internet activities. Footprint may be used by companies dealing
with e.g. credit
references, rental agreements.
Managing the footprints going forward:
• keep personal / work accounts separate / separate accounts for different functions
• don’t use same user names for multiple accounts / set up multiple profiles
• security measures / clearing cookies / browser add ons to prevent tracking
• deliberate management of active footprint(s) to suit Sanjeev’s purposes
• use of anonymous / private browsing / secure browser (add ons)
Professional communities
Aggregation that provide environments for professionals to share their knowledge
body, as cultures of similar work, problems perceptions, techniques of problem
resolution, professional values, legal aspects, professional behavior, and so forth.
Local communities
While many types of online communities exist only online, local communities are
based around a physical space or geographical location. This means they tend to be
smaller and have a more specific focus compared to other online communities.
Common circumstance communities
Communities of circumstance offer individuals the chance to connect with other
members who share similar life experiences to them.
Communities of circumstance tend to have aims related to helping members with
issues and challenges they’re facing as a result of their circumstances, for instance,
motherhood, chronic illness or disabilities. They are a space to share advice,
personal experiences and relevant information.
Common interest communities
Simply like fan communites
Target Marketing
- Social networking = ppl interests - Store info on database
- Sell info to advertisers
.•. Ability match members to advertisers
Target marketing is a marketing strategy that breaks a market into segments and
then concentrates your marketing efforts on one or a few key segments consisting of
the customers whose needs and desires most closely match your product or service
offerings. It can be the key to attracting new business, increasing sales, and making
your business a success.
Pay-Per-Click Advertising
- Digital ads - Allows targeted users online - Pay for actions
Pay-per-click (PPC) is an online advertising model in which an advertiser pays a
publisher every time an advertisement link is “clicked” on. Alternatively, PPC is
known as the cost-per-click (CPC) model. The pay-per-click model is offered
primarily by search engines (e.g., Google) and social networks (e.g., Facebook).
Google Ads, Facebook Ads, and Twitter Ads are the most popular platforms for PPC
advertising.
Exam Questions
Gathii uses free cloud storage for his images.
Explain one benefit and one drawback to Gathii of using free cloud storage
Award up to two marks each for one benefit and one drawback such as:
Benefits:
• can be accessed from anywhere with internet (1) which means Gathii can blog
while away from home / from a photo location (1)
• Gathii does not need to purchase extra storage (at home / on his system) (1)
saving money (1) (needs to have a description of the saving to be awarded this
mark)
• data security, assuming Gathii keeps copies at home as well as in the cloud / keeps
photos on both sites (1) this means that Gathii does not need to worry about making
backups / recovering from disasters e.g. his home storage device failing (1)
Drawbacks:
• requires internet access (1) which means Gathii may not always be able to get at
his data (1)
• there may be limitations on e.g. bandwidth, storage time, time before non-accessed
accounts are deleted (1) which means Gathii may not always be able to access his
files. (1)
• cloud storage is ‘someone else’s’ computer’ (1) which means that Gathii has limited
control over e.g. security, who can see the data (1)
Mobile devices use apps for playing media files. Some of these apps send the
media files to the cloud for processing.
Discuss the advantages and disadvantages of using cloud computing for
processing data in this way.
Answers should be in the context of using cloud computing to process data.
Advantages:
• to users
◦ can play a file where the app does not support it
◦ can process data where the device is unable to do so
◦ does not need multiple apps
• to the app company
◦ get users for their app, increasing ad revenue etc.
◦ has records of what users view, can be monetised
◦ can use the system to expand into other devices/functions
Disadvantages:
• to users
◦ device must be online when using the app
◦ requires use of data allocation/costs money for data
◦ third party has control of some device/app functions
◦ may be lag in receiving media due to connection speed, bandwidth issues
◦ third party has records of users viewing/playing habits
• to the app company
◦ needs money/resources for the servers
◦ solution must be easily scalable, may need to be set up in several countries to
overcome lag issues
◦ need to advertise the solution to get users
◦ need to deal with legal issues, copyright, legality of what users are viewing in
different countries