click below
click below
Normal Size Small Size show me how
Year 7 Internet 101
Internet and Data Exchange Basics
Question | Answer |
---|---|
Bit (Binary Digit) | The single unit of information in a computer, typically represented as a 0 or 1. Bits are referred to as any pair of opposites, e.g. On/Off and |
Byte | 8 Bits strung together. |
Bandwidth | The maximum transmission capacity of a device, measured by bit rate. |
Bit rate (bitrate) | The number of bits that a system can send over a given period of time e.g. 8 bits/sec |
Fiber optic cable | A network cable that contains strands of glass fibers and uses beams of light to transmit data. A really fast method to transmit data, but can be expensive. |
Wireless data transmission | A method of data transmission that uses radio waves to send bits from one device to another on the network. |
Wired data transmission | A method of data transmission that uses electricity passed through copper wires to send bits from one device to another. It is cheap, but prone to signal loss. |
Latency | The time delay from the transmission of the data to the destination arrival time. For example high latency is experienced as lag in games and can lead to significant delays between your input and your character’s action. |
Internet Protocol (IP) | A unique address written using a set of numbers organised in a particular way to identify each device on the network. |
Internet service provider (ISP) | A company that provides customers with Internet access. |
A Protocol | A well-known set of rules and standards used to communicate between machines. |
Domain Name System (DNS) | an Internet service that translates website names into IP addresses. The website names are alphabetic, as they're easier to remember. The Internet however, is really based on IP addresses. |
DNS spoofing | A type of cyber attack, when an attacker hacks into a server and changes the domain name to match with a wrong IP address and sends people to an imposter website. |
Router | A piece of computer hardware that acts as traffic managers to keep information packets moving efficiently over the Internet. |
The Internet | A global wide area network (WAN) that connects computer systems across the world. |
Web browser | The application you use to access and view the web pages from your device. |
Uniform Resource Locator (URL) | An address that identifies a particular webpage on the Internet. |
Algorithm | A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer. |
Transmission Control Protocol (TCP) | A network protocol that manages the sending and receiving of all your data. Its role is to do an inventory to see if all packets have been received and are in correct order. |
Network redundancy | Having multiple backups to ensure reliability during cases of high usage or failure. |
Server | A computer that awaits and responds to requests for data. |
Client | A computer that requests data stored on a server. |
Hypertext Transfer Protocol (HTTP) | A protocol used on the World Wide Web (WWW) to communicate between web browsers and the server in order to transfer data. For example, requesting to open web pages and files. |
HTML (Hypertext Markup Language) | The code that controls the structure of content on webpages. |
Cookies | ID cards sent from a website and stored on the user's device by the user's web browser so the next time you visit that site it will know who you are and load correct pages. |
SSL and TLS | A layer of security that provides secure channel for your online communications and protects you from hackers, by checking that a website has an authentic digital certificate. |
Cybercrime | An act when someone is exploiting vulnerabilities in hardware and software to steal, compromise information or hack and hijack equipment. |
Computer virus | A program that gets installed usually unintentionally and harms the computer, it can often spread to other computers. |
Distributed Denial of Service (DDoS) | When a virus affects millions of computers worldwide and creates a BOT NET (digital bomb) to attack and take down websites. This is achieved by the hackers overwhelming a website with too many requests. |
Phishing scam | The attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication, e.g. via email. |