Skip to main content

P1: Describe the Internet and the Worldwide Web are and how they operate

INTERNET:

- A global communications system capable of exchanging data through complex computer and server networks. A global network used to connect people around the world through many different things. However, due to the vast size of the internet networks have become fragmented into sub-networks to relieve the high traffic flow for efficiency and act as safe under damaged network conditions

INTERNET OPERATES:

- Internet is run by the server. This is where information on the internet is stored. In addition, they can also share information with other servers and also make all the information available to the public. For companies or individuals to access the internet they need to use a browser type. This is what it is used to access information on the internet. Without using a browsers type people will not be able to access the internet. The internet can work either wireless or wired. Connecting with cables is where they need to plug the computer into a Wi-Fi in order to work with the internet

SERVERS:

- The primary access point for a computer or client and operates by allowing access to data hosted on its own servers or replicated hosted data on another server. Internet is the host of various types of data which is why some servers are now experts in organizing certain types of data or implementing something for efficiency. Examples of servers:

Figure 1
  • Internet
  • Modem
  • Router
  • Secured Wireless Access Point
  • Server
  • Firewall
  • Switch
  • Work Stations
  • Printers
CONNECTIONS:

- There are three main types of internet connection with each offering different connection speeds and data transmission methods:
  • Modem or Dial-Up
  • Broadband
  • Fiber Optic
a) Modem or Dial-Up

Figure 2
- The internet connection with modem uses analog signal through telephone line to make connection with internet service provider. The information requested sent back via telephone line in analog signal which then converted by modem to digital format and accessible to the computer

b) Broadband

Figure 3
- The connections deliver information through DSL or cable lines and provide fixed and fast internet connectivity without interruption to phone line. The telecommunications where broad frequency is available for transmitting information

c) Fiber Optic

Figure 4
- The pathways using light emission and refraction signals to transmit data via fiber optic cables are transformed into formats on the router so the computer can understand the information

INTERNET SERVICE PROVIDER (ISP)

Figure 5
- It is an organizations that provide access to the internet using dial-up, broadband or fiber optic connections. The data may be sent using several technologies. Businesses that offer internet and businesses that offer internet and business access to individuals

WORLDWIDE WEB (WWW):

Figure 6
- A system that allows users to exchange files and information over the internet through websites. Basically, an internet server system that supports specially formatted documents. It is based on a number of different technologies that make users search and share information over the internet which includes web browsers:
  • Hypertext Markup Languages (HTML)
  • Hypertext Transfer Protocols (HTTP)
- To access the internet and view webpages, users need internet browsing software such as Internet Explorer that displays HTML-coded files and expert files that may require plugins

PROTOCOLS:

- It is a set of rules that users and internet devices should follow to maintain the efficiency and function of the internet. There are three protocols that must be followed:
  • Internet Protocol (IP)
  • Transmission Control Protocol (TCP)
  • Hypertext Transfer Protocol (HTTP)
a) Internet Protocol

- It sets a unique 10-digit identification number to every device, network, host and organization connected to the internet. It sets a rules that govern the format of data transmitted over the internet or other networks

b) Transmission Control Protocol 

- The data sent over the internet is initially broken into smaller binary code clusters called pockets to the intended IP address. The transport layer control on the OSI layer and is used to make connections between remote computers by transporting and ensuring the transmission of messages over the support and internet network

c) Hypertext Transfer Protocol

- It is a coding where web browsers and servers deliver data to one another and determine the order of communication patterns and converted data formats. The function of this protocol is to establish a specific way in which the web browser and server sent data through HTML. Without HTML, the internet will be a different network that all strive to operate with each other. The data is converted into web flows around the world in an organized pattern and understood when data exchange is complete

DOMAIN NAMES:

Figure 7
- It is an alternative method for entering a website address that uses an alphabetical and numerical symbol that opposes an IP address. It created because people cannot remember long numbered IP addresses. For instance, www.google.com

WORLDWIDE WEB CONSORTIUM (W3C):

Figure 8
- It is a major body in ensuring the worldwide web grows in ways that are accessible and useful in some ways. The mission for full potential by developing protocols and guidelines to ensure long term web growth. It is also to ensure industry experts comply with certain core principles and structures and operate using compatible HTML coding to maximize the accessibility and benefits of the material

INTERNET SOCIETY (ISOC):

Figure 9
- A global company that focuses efforts on internet-related standards and supports several smaller administrative bodies. It is the same as the worldwide web in a way that both want the internet to flourish in a useful way

NETWORK:

- A system that consists of two or more linked computer devices and can communicate with each other in a certain way. There are several different network connections including:
  • Home-area Network (HAN)
  • Local-area Network (LAN)
  • Wide-area Network (WAN)
  • Metropolitan-area Network
- Wireless networks use LAN connections via radio waves to connect different devices and quickly cut wired connections because of the benefits they hold

WI-FI:

- It allows wireless connections between devices using certain radio signals which allows access to the internet and other computers on the network. However, the router must be connected to the internet to provide internet access to the connected device. It is useful because it allows internet access without any cables and can be taken as long as it is within the wireless router environment

BLUETOOTH:

Figure 10
- It connects the device wirelessly. It can be used to send a small amount of data commonly used by mobiles phones and cameras. It can also be used by laptops computers as long as they have a Bluetooth chip installed of it has been installed in it

4G:

- It is the fourth generation of cellular networks. It is the faster network speed and better network coverage which uses wireless application protocol (WAP) to enable connection to the internet

PERSONAL DIGITAL ASSISTANT (PDA):

- A handheld computer device capable of storing and organizing personal data, connecting to the internet and transferring data via Bluetooth and Wi-Fi. The most of it have built up the ability to save records, connect to the internet and other network to download upload data and synchronize data with data on desktop computers

SMARTPHONES:

Figure 11
- It is the same like personal digital assistant which can be used to organize personal data, surf the internet and have Bluetooth and Wi-Fi capabilities. however, it have more sophisticated software than personal digital assistants and are able to run advanced applications and use other technologies such as 4G

Comments

Popular posts from this blog

M1: Give four different types of business activity and demonstrate how to solve the problems in internet use

NON-DELIVERING OF EMAIL Risks: Sent it to the wrong email address and got a mail from Mail Delivery Subsystem Email address are fake usernames that cannot be found Actions: Always check who am I going to send email to Did not receive the Mail Delivery Subsystem means, I sent to the correct person Always re-read the email before send it TOO MANY HITS ON A SEARCH ENGINE Risks: It contains millions or billions or more There is no friendly and smart web to help with the information Actions: Use many keywords to receive more specific results The number from the searches getting decreases as I only type the keywords ERROR MESSAGES Risks: Not enough space Actions: Free up some memory space Get a larger memory space of hard disk BLOCKING OF WANTED EMAILS Risks: Certain senders unsolicited messages The companies ways to promote their goods and promotions going on Actions: Choose the "

P4: Describe the actions taken to reduce risks to security whilst using the internet for different types of business activities

HOW TO REDUCE RISK? - There is a lot of risk when using the internet for business-related activities. When the company has physical premises, they have a threat to be solved. However, when they use the internet there are some risks they need to be careful CHECKING BEFORE DOWNLOADING EMAILS: Figure 1 - There are some annoying issues when online, especially when receiving spam mail. Spam mail is another word for junk mail, it is an accidental mail, but it can be blocked all spam mail if install a filling on the email account. Another annoying issue that must be faced by online businesses is spyware. This software is an aggressive commercial and will continue to try different methods to get to their computer. Once it's on the computer, it will start to try and sell the stuff or it can steal passwords and card details - To reduce the risk just to to internet options > tools > security options, make sure it is switched to medium or high security. Adware is an

P2: By using contrasting businesses, describe examples of how the internet is used

TESCO PLC: Figure 1 - UK based retailer and online shipping business. The popular retailer was founded in 1919 and has grown into one of the largest retailers in the world. Retailers offer a range of items including groceries, home electronics and DVD rentals. In 2007, the company opened its first store in the United States under the name Fresh and Easy - Tesco has been use the internet extensively especially for the use of their customers. It is to have an online website accessible to all Tesco customers and the public. Apart from that, Tesco also use social media to promote their business online to reach a wide range of people. It allows them to reach people and let people know about new products or opportunities that may occur in the company - Moreover, it is to maintain customer base. To store all the information about their online customers and they mainly do this by having all their information set for loyalty cards. It will help create customer loyalty to save t