Term 2 Week 2 Notes and Activity
Term 2 Week 2 Notes and Activity
Term 2 Week 2 Notes and Activity
2. Internet services
2.1 Real-time messaging
Real time messaging is also known as instant messaging (IM).
Users exchange messages immediately, while other systems such as e-mail have a delay.
Allows users cheaper communication and multiple users at a time.
Page 1 of 10
2.3 File transfer protocol
Internet service used to transfer files over the Internet.
Page 2 of 10
11 May 2021 Tuesday Day 6
Page 3 of 10
12 May 2021 Wednesday Day 6
Page 4 of 10
4.6 CAP and bundles
A cap is a limit placed on the amount of uploads and downloads a user may make on an Internet
connection
A bundle is similar to a cap in that an operator allows the client a certain amount of data to be used.
After the bundle is finished a user may be charged for data used thereafter.
Page 5 of 10
5 Social implications
5.1 Right to access and the right to privacy
Everybody has the right to privacy.
Only you have the right to access your own work and not anyone else.
Access rights help to protect data and information from outsiders.
Page 6 of 10
5.5 Computers can be taken over
A zombie is a computer that has been taken over by a criminal and is being controlled from a
different physical location.
The criminal can use the computing power and Internet connections of the zombie army to
perform multiple DoS attacks, send spam or spread malware to other computers around the
world.
Bots are independent programs that perform automated tasks over the Internet.
Bots perform tasks that are simple and repetitive much faster than humans can
Bots can be used for malicious purposes such as collecting e-mail addresses from web pages to be
used for spam.
Page 7 of 10
13 May 2021 Thursday Day 7
6 Security issues
6.1 Malware and spyware
Malware is the term we use for harmful software such as viruses, Trojans and worms that
perform unwanted actions on a computer, or generally disrupt the way a computer normally
works.
Spyware is a type of malware that secretly collects information such as your browsing history or
even redirects websites and slows down the Internet connection.
6.2 Adware
Adware is any application that displays online advertisements on web pages, e-mail or other
Internet services.
Adverts can be in the form of banners or pop-ups.
6.3 Pop-ups
A pop-up is an advertisement that opens in a new window, usually displayed on a web page in the user’s
web browser.
Page 8 of 10
7 Security safety measures
8.1 Communication
Communications technologies include:
E-mails being sent and received almost immediately
Video conferencing
Cellphones allowing calls from almost anywhere.
8.2 Banking
Banks allow users to complete banking tasks such as transfers and paying accounts from anywhere using
Internet or cellphone banking.
8.3 Commerce
Businesses have a larger, global market to sell to.
Page 9 of 10
14 May 2021 Friday Day 7
Term 2 Assessment 1
Questions
1. Why can the Internet be described as a WAN? (1)
2. Name TWO advantages of real-time messaging. (2)
3. Define the term cloud storage. (2)
4. Name TWO advantages for the government with regards to tax return being done
electronically via e-filing on the Internet. (2)
5. Explain what the difference is between a router and a modem by referring to the function
of each. (2)
6. How would the term bandwidth influence your choice of Internet connection? (2)
7. Your new uncapped ADSL Internet connection is soft capped at 50GB per month.
7.1 What does 'soft capped' mean? (2)
7.2 The account is also a shaped account. How could this impact your use of the connection?
(2)
8. Why would a DoS attack be performed? (1)
9. Briefly define each of the following terms:
9.1 Spyware (1)
9.2 Pop-up (1)
9.3 Keylogger (1)
10. What type of software can be used to protect your computer from illegal attempts to
access it via a network or the Internet? (1)
TOTAL MARKS [20]
Page 10 of 10