1. online services
1.1. communication
1.2. real-time information
1.3. commerce
1.4. goverment
1.5. Education
1.6. VLE
1.7. Business
1.8. Entertainment
1.9. Download service
2. online advertising
2.1. search engine results pages
2.2. bannes and pop-up advertisement
2.3. email marketing
3. Online software
3.1. backed up automatically
3.2. can be used on different devices
3.3. updated automatically
3.4. can be used on different operating systems
4. file compression
4.1. Saving memory space on computers
4.2. Files will upload and download more quickly
4.3. Files will better fit restrictions
5. online backups
5.1. if the user's computer fails, the files are saved on servers elsewhere and would still be safe
5.2. cloud storage is often also backed up, so there is double security
6. standalone software
6.1. as it is installed onto the hard drive, it can be used when there is no internet access
6.2. it runs faster than online software with a poor internet connection
7. collaborative working
7.1. users do not need to travel to work together
7.2. save money
7.3. save time
7.4. users can work on the same document instead of having different versions of the same file.
8. file permissions
8.1. read only
8.2. read/write
8.3. full control
9. VoIP
9.1. Adv
9.1.1. Able to contact someone anywhere in the world where there is an internet connection
9.1.2. uses internet-only os no additional cost
9.1.3. reduces travel cost, travel time
9.2. Disadv
9.2.1. relies on internet connection, so it can be a slow connection or it cab cut out
9.2.2. as the audio is being converted to digital, transmitted over the internet connection and converted back agai, the voice quality can be affected
9.2.3. data exchange over the internet is at risk of security threats such as hackers
10. Cloud storage
10.1. adv
10.1.1. You only pay for the storage that you use. You do not have to provide and maintain the hardware
10.1.2. Data can be available anywhere in the world where there is an internet connection
10.2. disadv
10.2.1. It depends on how reliable the host is to access the data
10.2.2. The company may not be using the latest, fastest version of software
10.2.3. You have no control over the files stored and you have ti trust the company to keep them save
10.2.4. The speed of accessing data might be slower than using installed software
11. connection methods
11.1. wireless
11.1.1. Adv
11.1.1.1. not fixed to a stationary computers
11.1.1.2. can be used wherever wireless internet is available
11.1.2. Disadv
11.1.2.1. Needs to have wireless internet available
11.1.2.2. can be less secure than wired
11.1.2.3. tends to be slower than wired
11.2. broadband
11.2.1. Adv
11.2.1.1. better reception and faster than dial-up
11.2.2. Disadv
11.2.2.1. Wired, so has to be used on a stationary computer
11.3. dial-up
11.3.1. Adv
11.3.1.1. can use existing telephone lines, giving connection where broadband is not available
11.3.2. Disadv
11.3.2.1. older technology can give poor reception
11.3.2.2. conversation between digital and analogue signals can cause errors
11.3.2.3. usually slower than other methods
12. Email
12.1. Adv
12.1.1. You can send files as attachments
12.1.2. You can send messages to multiple people at the same time
12.1.3. It is faster than post
12.1.4. You can forward messages you have received to other people
12.1.5. You can record contacts in an address book
12.1.6. Webmail providers tend to store emails on a remote provider, meaning that you can access them anywhere via a web browser
12.1.7. You can set a distrbution lists to quickly send to multiple people at the same time
12.2. Disadv
12.2.1. Viruses can be spread through emails
12.2.2. Phising emails may be received
12.2.3. Employees in a business may spend time on their personal email at work
12.2.4. Emails may be intercepted and read by hackers
12.2.5. Spam can be irritating, wasting time and take up space in your inbox
13. Data Exchange
13.1. Packet switching
13.1.1. Adv
13.1.1.1. Sends data across a network efficiently
13.1.1.2. it means big files which would otherwise clog up the network, can be sent whole
13.1.1.3. Allows efficient movement of data through a network because small packets can choose different roots through the network
13.1.1.4. There is a security benefit because if a packet is intercepted, the hacker will only have one part of the whole file
13.1.2. Disadv
13.1.2.1. If one or more packets are lost or corrupted during transmission, the whole file will not be received correctly.
13.1.3. Process
13.1.3.1. Error control bits
13.1.3.1.1. data
14. transmission methods
14.1. wireless
14.1.1. infrared
14.1.1.1. Adv
14.1.1.1.1. reliable
14.1.1.2. Disadv
14.1.1.2.1. short range
14.1.1.2.2. devices must be in line of sight
14.1.1.2.3. can suffer from interference
14.1.2. microwave
14.1.2.1. Adv
14.1.2.1.1. good for longer distances
14.1.2.2. Disadv
14.1.2.2.1. can suffer from interference from other devices
14.1.3. satellite
14.1.3.1. Adv
14.1.3.1.1. good for very long distances
14.1.3.2. Disadv
14.1.3.2.1. very expensive
14.2. wired
14.2.1. UTP/STP
14.2.1.1. Adv
14.2.1.1.1. interference lessened due to the twisting
14.2.1.1.2. cheaper than other methods
14.2.1.1.3. reliable
14.2.1.2. Disadv
14.2.1.2.1. slow
14.2.1.2.2. low capacity
14.2.1.2.3. used over short distances
14.2.1.2.4. susceptile to noise, which means that the data can be interfered with if near another digital device or signal
14.2.2. Coaxial
14.2.2.1. Adv
14.2.2.1.1. reliable
14.2.2.2. Disadv
14.2.2.2.1. slow
14.2.2.2.2. low capacity
14.2.2.2.3. used over short distances
14.2.2.2.4. thick and physically unflexible
14.2.2.2.5. susceptible to noise
14.2.3. Fibre optic
14.2.3.1. Adv
14.2.3.1.1. fast
14.2.3.1.2. used over long distances
14.2.3.1.3. little interference
14.2.3.2. Disadv
14.2.3.2.1. expensive
14.2.3.2.2. complex to install
15. processing
15.1. client-side
15.1.1. Adv
15.1.1.1. speed - faster because the data is on the client and does not need to move across the internet
15.1.1.2. security - data cannot be intercepted on the client in the way it can when it moves across the internet
15.1.2. Disadv
15.1.2.1. browser-specific - different browsers process scripts in different ways, therefore the web page owner cannot be sure how their web page will appear on the screen
15.1.2.2. computer speed - the web page owner is reliant on the processor speed of the client's computer, so if that is slow then the processing will be slow
15.2. server-side
15.2.1. Adv
15.2.1.1. Efficiency - the information to process does not need to be downloaded to the client's computer
15.2.1.2. Browser independent - It does not matter which browser the user has as the work is done seperatly on the server
15.2.1.3. speed - the processing occurs on the web server , which is likely to be more powerful than a client's computer
15.2.2. Disadv
15.2.2.1. security - when data is transferred across the internet, it is more at risk of security threats
15.2.2.2. overloading - if a lot of users are asking the web server to process data, it could overload the server and cause it to run slowly or crash