Get Started. It's Free
or sign up with your email address
Rocket clouds
BTEC ICT by Mind Map: BTEC ICT

1. online services

1.1. communication

1.2. real-time information

1.3. commerce

1.4. goverment

1.5. Education

1.6. VLE

1.7. Business

1.8. Entertainment

1.9. Download service

2. online advertising

2.1. search engine results pages

2.2. bannes and pop-up advertisement

2.3. email marketing

3. Online software

3.1. backed up automatically

3.2. can be used on different devices

3.3. updated automatically

3.4. can be used on different operating systems

4. file compression

4.1. Saving memory space on computers

4.2. Files will upload and download more quickly

4.3. Files will better fit restrictions

5. online backups

5.1. if the user's computer fails, the files are saved on servers elsewhere and would still be safe

5.2. cloud storage is often also backed up, so there is double security

6. standalone software

6.1. as it is installed onto the hard drive, it can be used when there is no internet access

6.2. it runs faster than online software with a poor internet connection

7. collaborative working

7.1. users do not need to travel to work together

7.2. save money

7.3. save time

7.4. users can work on the same document instead of having different versions of the same file.

8. file permissions

8.1. read only

8.2. read/write

8.3. full control

9. VoIP

9.1. Adv

9.1.1. Able to contact someone anywhere in the world where there is an internet connection

9.1.2. uses internet-only os no additional cost

9.1.3. reduces travel cost, travel time

9.2. Disadv

9.2.1. relies on internet connection, so it can be a slow connection or it cab cut out

9.2.2. as the audio is being converted to digital, transmitted over the internet connection and converted back agai, the voice quality can be affected

9.2.3. data exchange over the internet is at risk of security threats such as hackers

10. Cloud storage

10.1. adv

10.1.1. You only pay for the storage that you use. You do not have to provide and maintain the hardware

10.1.2. Data can be available anywhere in the world where there is an internet connection

10.2. disadv

10.2.1. It depends on how reliable the host is to access the data

10.2.2. The company may not be using the latest, fastest version of software

10.2.3. You have no control over the files stored and you have ti trust the company to keep them save

10.2.4. The speed of accessing data might be slower than using installed software

11. connection methods

11.1. wireless

11.1.1. Adv

11.1.1.1. not fixed to a stationary computers

11.1.1.2. can be used wherever wireless internet is available

11.1.2. Disadv

11.1.2.1. Needs to have wireless internet available

11.1.2.2. can be less secure than wired

11.1.2.3. tends to be slower than wired

11.2. broadband

11.2.1. Adv

11.2.1.1. better reception and faster than dial-up

11.2.2. Disadv

11.2.2.1. Wired, so has to be used on a stationary computer

11.3. dial-up

11.3.1. Adv

11.3.1.1. can use existing telephone lines, giving connection where broadband is not available

11.3.2. Disadv

11.3.2.1. older technology can give poor reception

11.3.2.2. conversation between digital and analogue signals can cause errors

11.3.2.3. usually slower than other methods

12. Email

12.1. Adv

12.1.1. You can send files as attachments

12.1.2. You can send messages to multiple people at the same time

12.1.3. It is faster than post

12.1.4. You can forward messages you have received to other people

12.1.5. You can record contacts in an address book

12.1.6. Webmail providers tend to store emails on a remote provider, meaning that you can access them anywhere via a web browser

12.1.7. You can set a distrbution lists to quickly send to multiple people at the same time

12.2. Disadv

12.2.1. Viruses can be spread through emails

12.2.2. Phising emails may be received

12.2.3. Employees in a business may spend time on their personal email at work

12.2.4. Emails may be intercepted and read by hackers

12.2.5. Spam can be irritating, wasting time and take up space in your inbox

13. Data Exchange

13.1. Packet switching

13.1.1. Adv

13.1.1.1. Sends data across a network efficiently

13.1.1.2. it means big files which would otherwise clog up the network, can be sent whole

13.1.1.3. Allows efficient movement of data through a network because small packets can choose different roots through the network

13.1.1.4. There is a security benefit because if a packet is intercepted, the hacker will only have one part of the whole file

13.1.2. Disadv

13.1.2.1. If one or more packets are lost or corrupted during transmission, the whole file will not be received correctly.

13.1.3. Process

13.1.3.1. Error control bits

13.1.3.1.1. data

14. transmission methods

14.1. wireless

14.1.1. infrared

14.1.1.1. Adv

14.1.1.1.1. reliable

14.1.1.2. Disadv

14.1.1.2.1. short range

14.1.1.2.2. devices must be in line of sight

14.1.1.2.3. can suffer from interference

14.1.2. microwave

14.1.2.1. Adv

14.1.2.1.1. good for longer distances

14.1.2.2. Disadv

14.1.2.2.1. can suffer from interference from other devices

14.1.3. satellite

14.1.3.1. Adv

14.1.3.1.1. good for very long distances

14.1.3.2. Disadv

14.1.3.2.1. very expensive

14.2. wired

14.2.1. UTP/STP

14.2.1.1. Adv

14.2.1.1.1. interference lessened due to the twisting

14.2.1.1.2. cheaper than other methods

14.2.1.1.3. reliable

14.2.1.2. Disadv

14.2.1.2.1. slow

14.2.1.2.2. low capacity

14.2.1.2.3. used over short distances

14.2.1.2.4. susceptile to noise, which means that the data can be interfered with if near another digital device or signal

14.2.2. Coaxial

14.2.2.1. Adv

14.2.2.1.1. reliable

14.2.2.2. Disadv

14.2.2.2.1. slow

14.2.2.2.2. low capacity

14.2.2.2.3. used over short distances

14.2.2.2.4. thick and physically unflexible

14.2.2.2.5. susceptible to noise

14.2.3. Fibre optic

14.2.3.1. Adv

14.2.3.1.1. fast

14.2.3.1.2. used over long distances

14.2.3.1.3. little interference

14.2.3.2. Disadv

14.2.3.2.1. expensive

14.2.3.2.2. complex to install

15. processing

15.1. client-side

15.1.1. Adv

15.1.1.1. speed - faster because the data is on the client and does not need to move across the internet

15.1.1.2. security - data cannot be intercepted on the client in the way it can when it moves across the internet

15.1.2. Disadv

15.1.2.1. browser-specific - different browsers process scripts in different ways, therefore the web page owner cannot be sure how their web page will appear on the screen

15.1.2.2. computer speed - the web page owner is reliant on the processor speed of the client's computer, so if that is slow then the processing will be slow

15.2. server-side

15.2.1. Adv

15.2.1.1. Efficiency - the information to process does not need to be downloaded to the client's computer

15.2.1.2. Browser independent - It does not matter which browser the user has as the work is done seperatly on the server

15.2.1.3. speed - the processing occurs on the web server , which is likely to be more powerful than a client's computer

15.2.2. Disadv

15.2.2.1. security - when data is transferred across the internet, it is more at risk of security threats

15.2.2.2. overloading - if a lot of users are asking the web server to process data, it could overload the server and cause it to run slowly or crash

16. Laws

16.1. Computer Misuse Act 1990

16.2. Copyright Designs and Patents Act 1988

16.3. Freedom of Information Act 2000

16.4. Data Protection Act 1998

17. Threats to data

17.1. Opportunity threats

17.2. computer viruses

17.3. other malware

17.4. phishing

17.5. Accidental damage

17.6. Hackers

18. Protection of data

18.1. Physical barriers

18.2. Password control of access

18.3. Access levels

18.4. Anti-virus software

18.5. Firewall

18.6. Encryption

18.7. Backup and recovery

18.8. Personal safety

19. Data Protection Act 1998

19.1. Process date fairly and lawfully

19.2. Used for the stated purpose

19.3. Data is suitable for purpose - not excessive

19.4. Accurate as well as up-to-date

19.5. Not stored longer than needed

19.6. The data subject's rights are honoured

19.7. Measures taken to protect the data

19.8. Not sent abroad unless a DPA exists there

19.9. Organisations must register

20. SQL

20.1. DDL

20.2. DML