0% found this document useful (0 votes)
216 views31 pages

Short Note in Ict (Igcse)

Email is a method of sending digital messages between computers or mobile devices. While email is a popular form of communication, some countries have laws around appropriate email use and content to prevent misuse. Effective security practices like strong passwords and antivirus software can help protect email.

Uploaded by

razan nazeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
216 views31 pages

Short Note in Ict (Igcse)

Email is a method of sending digital messages between computers or mobile devices. While email is a popular form of communication, some countries have laws around appropriate email use and content to prevent misuse. Effective security practices like strong passwords and antivirus software can help protect email.

Uploaded by

razan nazeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

 Email is short form for Electronic Mail.

 It is a method of sending digital messages from one


computer to another (this can also be done using mobile
phones).
 Email is very popular form of communication between
people.
 However many countries have laws to protect people from the misuse of
emails.
 When sending an email the language and content within the email
needs to be appropriate.
 If the emails is being sent to an employee within a business then the
language should be formal.
Examples of using inappropriate language:
 Abusive, threatening language.
 Obscene Images / illegal content
 Racist, violent messages
 The content of an email can be protected by the copyright
law.
 If the sender of an email states the message is confidential
then it is important the email is not forwarded onto a third
party.
 It could also be a case of attachments being downloaded and
also passed on.
 Sometimes organisations will send an email with a copyright
statement at the bottom of the email.
 Some methods of increasing the security of emails include:
 Strong password – combination of letters, numbers, special characters
 Changing password regularly
 Using spam filters – moving suspicious emails to a junk folder – blocking email
 Running anti virus and anti spam at times
 Passive attacks - learn or make use of information from the system but does not
affect system resources
 Active attacks - attempts to alter system resources or effect their operations
 Internet etiquette
 Don’t be abusive
 Don’t send spam
 Be clear and succinct with your message
 Remember posts are public in most cases and read by everyone
 Always check your spelling and grammar
 Respect peoples privacy
 Forgive peoples mistakes – don’t be compelled to respond to an error
 Don’t use capital letters – appears as shouting
 Don’t plagiarise
 Don’t use too many emoticons
 Unsolicited email - basically unwanted emails
 Spam (junk) email is sent out to multiple recipients from a
mailing list
 The email could be part of a phishing scam or could be to
promote certain products
 Dangerous - may contain viruses
 Email Groups are contacts which are grouped
together
 So that emails can be sent to multiple recipients.
 When sending an email to a group you would just
have to write the name of the group rather than
writing everyone's email address.
 Worldwide Collection of Networks
 Browse the internet
 Social Networking & Communication
 Online shopping & banking
 Transfer files from computer to computer
World Wide Web (WWW)
 World Wide Web is part of the internet.
 Can be accessed using a web browser.
 Consists of a massive collection of webpages.
 Defined as a computer network based on internet technology
 Normally accessible by internal members of the company via a username and
password.
 Information is specific to the needs of the company
 Less chance of external threats such hacking and viruses
 Possible to prevent external links
 Easier to send out sensitive information – they will remain with the organisation
 Better bandwidth
 Possible to create extranets – intranet extended outside the organisation but with
same advantage of intranet
 Online storage medium used to backup files.
 Files can be accessed from any device with an internet connection.
 Data is saved on more than one server so in case of maintenance or repair
data is always accessible.
 Public cloud : customers/client and cloud storage provider are different
companies
 Private cloud : customers/client and cloud storage provider are a part of a
single entity
 Hybrid cloud : combination of both
 Is the rules which are followed when transferring
information across the internet.
 Rules are agreed between the sender and recipient when
data is being transferred.
 Difference between http and https is that https is much
more secure compared to http
 In HTTP, Encryption is absent and Encryption is present in
HTTPS – HTTPS slower than HTTP
 A web browser is a software that allows the user to display a
webpage.
 They have a home page
 Ability to store users favourite websites /pages
 History of websites visited
 Can move forward and backward through web sites
 Hyperlinks – helps user to navigate between web pages
 A web browser will use URLs to access specified websites.
 URLs are represented by numbers (http://100.100.100.1)
 However it is not very user friendly.
 So therefore an alphanumeric format (http://www.yahmad.o.uk)
 Protocol – http/https
 Website address
 Domain host (www)
 Domain name(name of website)
 Domain type(.com, .org, .co, .net, .gov)
 Country codes(.uk, .us, .in)
 Path – root directory of website
 Filename – item on web page
FTP is a network protocol used when
transferring files from one computer to
another over the internet.

FileZilla is popular FTP application which is


used to upload web pages so that they can be
hosted and viewed on the internet.
 ISP is a company which provides internetaccess to
users.

 Normally the users would have to pay a monthly


fee.

 Broadband Connections tend to use fire-optic


cables for increased bandwidth.
 A blog is a personal internet journal
 Usually updated by one author.
 Blog entries are in order (most recent entries are shown
first).
 Blogs can not be changed by other users of the internet.
 Bloggers can be prosecuted for posting offensive material.
 Microblogs – often used on social networking sites to make
short, frequent post
 B blog – business blog – promote business on internet
Web applications or websites that allow users
to create and edit web pages using any web
browser
A wiki is a collaboration from users (many
authors) to create content.
Wikis can be edited by anyone (content can
be edited or deleted).
 Social Networking sites allow users to interact and communicate with each other.
 You can connect with people with similar interests.
 Each member has a free web space
 Users are able to share content such as photos, video and status updates
 They can create their own public and private profiles
 Instant messaging and video chatting
 Members have control over who can access their public and private data
 Email within the community
 Write on each others wall
 Invite people to become friends
 2 ways to locate information
 Type in URL
 Use a search engine

 OPENING A WEBSITE FROM A URL


 Type the URL in the address bar of the web browser
 A web search engine or Internet search engine is a software
system that is designed to carry out web search (Internet
search)
 Search the World Wide Web in a systematic way for particular
information specified in a textual web search query
 When we want to find some information but don’t know
where to look
Due to amount of information available on the
internet it is difficult to find specific
information quickly.
Search engines will not necessarily post the
website in order of usefulness so you may
have to look through different websites to find
your information.
Content on the internet is not regulated.
Any body can make a website and post any
content which is not factually correct.
Wikis can be edited to contain false
information.
Information may be biased depending on
who was the author.
 Checking the websites URL address (ending in .gov
or .ac more likely to be reliable)
 Check links or endorsements from other reliable
websites.
 Check the last time the website was updated.
 Check multiple websites
 If a website has excessive advertisement –
unreliable

You might also like