0% found this document useful (0 votes)
20 views20 pages

6.3 (Networks) - SUMMARY

Uploaded by

tran phuong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views20 pages

6.3 (Networks) - SUMMARY

Uploaded by

tran phuong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

L EARNING O UTCOMES

For this unit, you need to be able to:


 7CS.07 Know that Artificial Intelligence (AI) allows computers surroundings to produce
outputs based on how they are able to process that information.
 7CS.09 Explain a range of applications of AI, including in image recognition and in
computer games.
 7CT.02 Know how to create an algorithm using flowchart symbols.
 7CT.08 Select and use appropriate constructs in algorithms written as flowcharts, limited
to sequence and selection.
 7DC.01 Explain the use of IP addresses and URLs.
 7DC.02 Explain how DNS enables users to access websites.
 7DC.03 Know the differences between Bluetooth, Wi-Fi and cellular networks, including
the different generations of the cellular networks (4G, 5G).
 7DC.04 Outline why errors occur in data transmission.
 7DC.05 Explain the use of encryption to keep data secure during data transmission.
 7DC.06 Explain how to check whether a website is secure.

K EY V OCABULARY
Artificial intelligence An area of computing that focuses on creating intelligent computers
that can mimic the way humans think and make decisions; a computer
system able to perform tasks normally done using human intelligence,
such as understanding speech.
DNS (Domain Name A system used to translate a URL to an IP address.
System)
Data Raw facts and figures; computers understand only binary data, which is
0s and 1s.
Bandwidth The amount of data that can be transmitted within a certain amount of
time.
Interference What happens when something interrupts the transmission of a signal;
this could be a physical obstruction like a wall, or other radio waves.
Server A hardware device that stores and manages files and services for a
network.
Web server A server that provides access to web pages stored on them.
URL Uniform Resource Locator; the address of a web page.
IP (Internet Protocol) A unique (one-of-a-kind) address assigned to a device on a network.
address They are made of 4 numbers between 0-255 separated by a dot. e.g.
192.168.0.255
Domain name An easy-to-remember name for a website, e.g.
www.hoddereducation.com.
SSL certificate A SSL (Secure Sockets Layer) certificate is a digital file that:
• confirms that a website is genuine (real, not fake)
• means the website will keep your communication with it secure by
using encryption
Padlock icon Shows in the address bar if the page is sent via HTTPS and is secure.
Protocol Set of rules for how data is sent between devices.
Encryption A process that scrambles data so that it cannot be understood by
unauthorised users; only the device that the data is sent to is able to
<u>de</u>crypt the data using a key.
Virus Software designed to cause damage to computer systems.
Verify To check that something is correct.
Electrical interference When lots of electrical devices are operating in a small area, the
electrical and radio waves can cause other devices to work incorrectly.
Bit Short for ‘binary digit’; a single bit of data, either a 0 or a 1.
Byte A group of 8 bits of data, often used to represent a single character in a
computer, e.g. 01010011.
Search engine A website designed to search for content on other websites.
Database A computer application that is used to organise data that can then be
stored, processed and accessed electronically.
Machine learning Computer systems that are able to learn and adapt by analysing
patterns in data.
Image recognition Computers identifying similarities in lines, colours, textures and shapes
of an image in an attempt to identify objects.
Operating system The systems software that manages hardware, software and resources
on a device.

1 N OVEMBER
Do now – add this vocabulary to your notebook
Artificial intelligence
Computers that can mimic (copy) the way humans think and
make decisions; e.g. spotting patterns, recognising images,
understanding speech.
DNS (Domain Name System)
A system used to translate a URL to an IP address.
Data
Raw facts and figures; computers understand only binary data,
which is 0s and 1s.
Bandwidth
The amount of data that can be transmitted within a certain
amount of time.
Interference
What happens when something interrupts a signal; this could
be a physical obstruction like a wall, or other radio waves.
7.3.1 Worksheet 3
Fill in the blanks using the words below.
Devices transmission portable Wi-Fi

cellular
Bluetooth signals interference
network

Devices can connect to networks using WiFi

Bluetooth or a cellular network .

Devices connected to a Wi-Fi network can be moved

around, making them portable . Wi-Fi signals can be

affected by interference which can cause problems with

data transmission

Devices can connect to networks using Wi-Fi, Bluetooth or


a cellular network.
Devices connected to a Wi-Fi network can be moved
around, making them portable. Wi-Fi signals can be
affected by interference, which can cause problems with
data transmission.
pg 87-88
Group 1: WiFi
Group 2: Bluetooth
Group 3: Cellular networks: 4G
Group 4: 5G
Questions:
Is it wired or wireless?
How many Mbps (megabits per second) can it transfer?
[This number is the "bandwidth"]
How far can it send data?
How secure is it?
What kind of interference affects it?

See the summary on the next page …


1 N OVEMBER CONT .
Do now – add this vocabulary to your notebooks:
Server
A computing device that stores and manages files and services
for a network.
Web server
A server that provides access to web pages stored on them.
URL
Uniform Resource Locator; the address of a web page.
e.g. https://google.com/maps
IP (Internet Protocol) address
A unique (one-of-a-kind) address assigned to a device on a
network. They are made of 4 numbers between 0-255
separated by a dot. e.g. 192.168.0.255
The most important concepts…
Keyword Example Description

URL https://google.com/search This is the exact location of a webpage on the


internet .
… like "on the table in the kitchen"
Domain google.com The easy-to-remember name of a website.
name … like "Minh Anh's house".
Note: this is not enough information to get
there!!!
Your computer uses the DNS system to get the
exact IP address.
IP address 142.251.220.46 The address of any device or website on a
network . You use the IP address to find (locate) it.
… like "12 Phố Đinh Lễ, Hoàn Kiếm"
DNS - A server which converts domain names into IP
addresses.
… it is like an address book.
URLs are for humans to use and easy to remember.
IP addresses are the exact address.
DNS servers translate domain names (which are the key part of the URL) into IP addresses.
Activity: Networks, URL, DNS and https/padlock icon test

Some additional questions (and answers)


8 N OVEMBER
Do now – add this vocabulary to your notebooks:
SSL (Secure Sockets Layer) certificate
A digital file that:
 confirms that a website is genuine (real, not fake)
 means the website will keep your communication with it
secure by using encryption
Protocol
Set of rules for how data is sent between devices.
e.g. http and https are protocols.
Encryption
A process that scrambles data so that it cannot be understood
by unauthorised users; only the device that the data is sent to
is able to decrypt the data using a key.
Virus
Software designed to cause damage to computer systems.
Verify
To check that something is correct.
Activity 1
Using the key below, encrypt this: JUNGKOOKYAY
Plain text
Encrypted text
(Cipher text)

HINT … the letter "J" encrypts into the letter "H"

Activity 2
Using the key below, decrypt this: AMKNRSCP
Plain text
Encrypted text
(Cipher text)

HINT … the letter "A" decrypts into the letter "C"

Challenge
Write a message and encrypt it.
Then pass it to a friend and see if they can decrypt it correctly!
Look at this algorithm
1) You write a message on a piece of paper.
2) You put your message in a strong box.
3) You lock the Box with a padlock.
This padlock can only be opened with a special key that only you & your friend have.
4) You send the Locked Box to your Friend.
5) Your Friend receives the Locked Box.
6) Your Friend Unlocks the Box using their special key.
7) Your Friend reads the message.
Q1. In which step of the algorithm is the message encrypted?
(Encrypted means: made secure – only the allowed people can read it)
Q2. In which step of the algorithm is the message decrypted?
Q3. An attacker wants to find out what your message was. What could they do?
(A) break the padlock
(B) copy the key
(C) both of the above
Challenge
Q4. Your friend lost their key. What would you tell them to do and why ?
(A) Wait until the person who sent it sends the key.
(B) Try to guess the combination of the lock if it's a combination padlock.
(C) Find a locksmith or someone skilled enough to pick the lock or make a new key.
Do now – add this vocabulary to your notebooks:
Electrical interference
When lots of electrical devices are operating in a small area, the electrical and radio waves
can cause other devices to work incorrectly.
Bit
Short for ‘b inary digit ’; a single bit of data, either a 0 or a 1.
Byte
A group of 8 bits of data, often used to represent a single character in a computer, e.g.
01010011.
What an error looks like

Q1. Computer 1 sends the message 01000101


Unfortunately, there is an error in the data transmission.
Give 3 examples of what data Computer 2 may receive.

01000101 could become 11000101 – the first bit was flipped from a 0 to a 1
01000101 could become 00110101 – the second, third and fourth bits were flipped
01000101 could become 010 – the message was cut off
Why errors occur
Q2. Give 4 different reasons errors may occur.

HINT
Do now – add this vocabulary to your notebooks:
Database
A computer application that is used to organise data that can
then be stored, processed and accessed electronically.
e.g. a search engine
Artificial intelligence
Computers that can mimic (copy) the way humans think and
make decisions; e.g. spotting patterns, recognising images,
understanding speech.
Machine learning
Computer systems that are able to learn and adapt by
analysing patterns in data.
Image recognition
Computers identifying similarities in lines, colours, textures
and shapes of an image in an attempt to identify objects.
15 N OVEMBER
https://www.youtube.com/watch?v=DybczED-GKE

Examples of Artificial Intelligence


• self-driving cars – image recognition to help decide
where the car should go
• healthcare – image recognition to spot diseases (cancer)
on x-rays
• security (e.g. airports) – image recognition to detect
faces in photos
• search engines – learning what users want, to make
better recommendations
• entertainment (e.g. Netflix) – learning what users want,
to make better recommendations
• assisted living – reading text and speech recognition, to
make communication easier.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy