Documente Academic
Documente Profesional
Documente Cultură
Learning Aim B
Form: 10ALE
1
Lesson 1 – Key Internet Terms
(Student Book B – Pg 17-18)
.
Transmission TCP The protocol which takes data from a user’s application program and passes it to the IP for transfer
Control Protocol across the internet. The reverse operation is performed at the destination computer, i.e. the TCP
reassembles the data (from individual packets) and forwards them to the user’s application
program. The close relation with the IP means that the terms are usually used in combination, i.e.
TCP/IP.
File transfer FTP A standard protocol which allows fi les to be transferred between two computers on a TCP-based
Protocol network. It is commonly used to download programs to your computer from other servers and to
upload web pages that you have created to the server that is hosting them on the internet.
2
internet ISP An Internet service provider (ISP) is an organization that provides services for accessing and using
Service the Internet. Internet service providers may be organized in various forms, such as commercial,
Provider community-owned, non-profit, or otherwise privately owned.
In addition to providing a gateway to the internet, ISPs normally provide additional services such
as email. Many also provide web space for the development of websites, technical support and
troubleshooting
3
Infrastructure
Connecting backbone:
The _ _ _ _ connecting data routes between large _ _ _ _ _ _ _ _ on the internet and
smaller networks in local _ _ _ _ _ _ _.
4
Fill in the gaps below and be sure to make the correct match
5
Lesson 3 – Worldwide Web 1
(Student Book B – Pg 20-21)
shade me in shade me in
6
You will need to annotate the image below with explanations, use as many keywords as you can
within your explanations
Keywords
Pairs Opening tag End tag Head tags
paragraph HTML element HTML Formatting
7
8
Lesson 4 – Worldwide Web 2
(Student Book A – Pg 22 - 23)
What is a URL?
A URL is a universal resource locator that is
something that you would use to bring you to
web page.
What is a search engine? How have you used a search engine in the past?
A search engine is what you would use to search for information on the web
9
Using the image below explain how search engines work:
Search engines work by typing in what you want then it would take only a second to process and
your result would come up.
Read the statement below and re-write it in your own unique way
An automated web browser known as a crawler, spider and bot are used to follow every link in a
website. Each page is then analysed as it’s found and relevant data is extracted and stored on the
search engines index database.
Your version:
10
Fill in the missing blanks below?
When you enter a word or short phrase as a _ _ _ _ _, the search engine looks at its _ _ _ _ _
and displays a list of the ‘_ _ _ _ _ _ _ _ _ _ _matches’, together with a short extract from
each web page. With most general queries there will be many hundreds or even _ _ _ _ _ _ _
_ _ of matches, so the search engines operate a _ _ _ _ _ _ _ system for their indexes. The
ranking system is used to try to make the results of the searches _ _ _ _ _ _ _. However, as
search engines are commercial businesses, other companies can _ _ _ money to improve
their _ _ _ _ _ _ _ _ in the ranking system.
Using the information above can you relate that to the google search below?
11
Lesson 5 – Email
(Student Book B – Pg 24-26)
Within your email program you have an address book, what can you create with it?
An e-mail address or name to the Address Book. In a message that you receive, right-
click the name of the sender, and then click Add to Outlook Contacts. A contact form
opens, with the sender's name and e-mail address already filled i
12
What are the benefits of email? Draw a line of connection and fill in any missing gaps
First word Draw a line of connection Benefit of email
Speed
cost of delivery
Virus Spam
Phishing scam
Email protocols
Email Protocols
(Fill in the missing gaps)
Protocol Acronym Description
13
SMTP
POP3 Used to retrieve emails from an email server over a
TCP/IP connection. This is the most widely used email
retrieval protocol. Normally users download emails to
their local computer using POP3, deleting them from
the email server.
Internet
Message Access
Protocol
Describe the difference between the three email protocols SMTP, POP3 and IMAP.
Awesome job on developing your knowledge of emails. Can you now describe what email is
and how it’s used? You should also talk about the email protocols.
14
Lesson 6 - Data Exchange 1
(Student Book B – Pg 27 - 29)
VoIP can be run over smartphones what’s one of the most common VoIP systems?
15
Voice over input protocol
Wireless networks are computer networks that are not connected by cables of any kind.
The use of a wireless network enables enterprises to avoid the costly process of introducing
cables into buildings or as a connection between different equipment locations.
What wireless network have you used? Explain why you use it
Wireless networks have many advantages – probably the most important is mobility;
people are no longer tied to desks and wires. So what does the word mobility mean?
Mobility Scooter
For the next set of questions use the table on the next page
1. Which transmission method has the maximum range?
16
5. Give an example of how satelite is used:
17
18
Lesson 7 – Data Exchange 2
(Student Book A – Pg 30 - 31)
What is a byte?
19
USB
What does USB stand for? Write the answer 3 times?
Bi-directional transmission
Did you know that Bi means
A combining form meaning “twice,” “two,” used in
the formation of compound words: One example
would be bicycle as it has two wheels one behind
the other.
20
Lesson 7 – Data Exchange 2 (Continued)
(Student Book B – Pg 31 - 32)
21
Server Side Processing
22
Lesson 8 – Data Storage 1
(Student Book B – Pg 34 - 35)
Database structure
Fill on the blank spaces and write some examples of data types in the correct area
23
Logical (also called Boolean or Yes/no): represents a value
that is either true or false. For example, when a customer
opens an account with an online company, they might be
asked whether they are happy to receive marketing
material. Their answer could be stored in a logical field
(true if they are happy to receive marketing information,
false if they are not).
Type this link in your browser for some examples of data types
tinyurl.com/pvnofc4
Relationship between database tables
A database has two types of keys what are they? Can you explain both of them?
25
Lesson 9 – Data Storage 2
(Student Book B – Pg 35-36)
Online databases
What is used to help users’ build online databases? Do you have to pay?
Who is online data held by? What types of online databases are there?
26
What does DBMS stand for?
DBMS. Stands for "Database Management System." In short, a DBMS is a database program.
Technically speaking, it is a software system that uses a standard method of cataloging, retrieving,
and running queries on data.
What is a DBMS?
A database management system (DBMS) is system
software for creating and managing databases. The
DBMS provides users and programmers with a
systematic way to create, retrieve, update and manage
data.
SIMS Database
What does a DBMS allows you to do?
integrity - the structure of the database can change, but the applications using the data do not
need to be changed
efficiency - avoids data duplication and inconsistency, and less storage space is taken up because
data is shared
consistency - data is the same, regardless of who is viewing it
backups - it is easy to back up data from one location
security - the data is in a secure central place and different access rights can be assigned to different
people
customisation - applications can be customised to suit the needs of the user
An important part of a DBMS is separating applications from the data. When people use the
applications they call on the data they need to work on. They do not need to use all the data
every time they use the database.
A database in a DBMS could be viewed by lots of different people with different responsibilities.
27
Fill in the missing blanks
1. (DDL):
28