6.3 (Networks) - SUMMARY
6.3 (Networks) - SUMMARY
K EY V OCABULARY
Artificial intelligence An area of computing that focuses on creating intelligent computers
that can mimic the way humans think and make decisions; a computer
system able to perform tasks normally done using human intelligence,
such as understanding speech.
DNS (Domain Name A system used to translate a URL to an IP address.
System)
Data Raw facts and figures; computers understand only binary data, which is
0s and 1s.
Bandwidth The amount of data that can be transmitted within a certain amount of
time.
Interference What happens when something interrupts the transmission of a signal;
this could be a physical obstruction like a wall, or other radio waves.
Server A hardware device that stores and manages files and services for a
network.
Web server A server that provides access to web pages stored on them.
URL Uniform Resource Locator; the address of a web page.
IP (Internet Protocol) A unique (one-of-a-kind) address assigned to a device on a network.
address They are made of 4 numbers between 0-255 separated by a dot. e.g.
192.168.0.255
Domain name An easy-to-remember name for a website, e.g.
www.hoddereducation.com.
SSL certificate A SSL (Secure Sockets Layer) certificate is a digital file that:
• confirms that a website is genuine (real, not fake)
• means the website will keep your communication with it secure by
using encryption
Padlock icon Shows in the address bar if the page is sent via HTTPS and is secure.
Protocol Set of rules for how data is sent between devices.
Encryption A process that scrambles data so that it cannot be understood by
unauthorised users; only the device that the data is sent to is able to
<u>de</u>crypt the data using a key.
Virus Software designed to cause damage to computer systems.
Verify To check that something is correct.
Electrical interference When lots of electrical devices are operating in a small area, the
electrical and radio waves can cause other devices to work incorrectly.
Bit Short for ‘binary digit’; a single bit of data, either a 0 or a 1.
Byte A group of 8 bits of data, often used to represent a single character in a
computer, e.g. 01010011.
Search engine A website designed to search for content on other websites.
Database A computer application that is used to organise data that can then be
stored, processed and accessed electronically.
Machine learning Computer systems that are able to learn and adapt by analysing
patterns in data.
Image recognition Computers identifying similarities in lines, colours, textures and shapes
of an image in an attempt to identify objects.
Operating system The systems software that manages hardware, software and resources
on a device.
1 N OVEMBER
Do now – add this vocabulary to your notebook
Artificial intelligence
Computers that can mimic (copy) the way humans think and
make decisions; e.g. spotting patterns, recognising images,
understanding speech.
DNS (Domain Name System)
A system used to translate a URL to an IP address.
Data
Raw facts and figures; computers understand only binary data,
which is 0s and 1s.
Bandwidth
The amount of data that can be transmitted within a certain
amount of time.
Interference
What happens when something interrupts a signal; this could
be a physical obstruction like a wall, or other radio waves.
7.3.1 Worksheet 3
Fill in the blanks using the words below.
Devices transmission portable Wi-Fi
cellular
Bluetooth signals interference
network
data transmission
Activity 2
Using the key below, decrypt this: AMKNRSCP
Plain text
Encrypted text
(Cipher text)
Challenge
Write a message and encrypt it.
Then pass it to a friend and see if they can decrypt it correctly!
Look at this algorithm
1) You write a message on a piece of paper.
2) You put your message in a strong box.
3) You lock the Box with a padlock.
This padlock can only be opened with a special key that only you & your friend have.
4) You send the Locked Box to your Friend.
5) Your Friend receives the Locked Box.
6) Your Friend Unlocks the Box using their special key.
7) Your Friend reads the message.
Q1. In which step of the algorithm is the message encrypted?
(Encrypted means: made secure – only the allowed people can read it)
Q2. In which step of the algorithm is the message decrypted?
Q3. An attacker wants to find out what your message was. What could they do?
(A) break the padlock
(B) copy the key
(C) both of the above
Challenge
Q4. Your friend lost their key. What would you tell them to do and why ?
(A) Wait until the person who sent it sends the key.
(B) Try to guess the combination of the lock if it's a combination padlock.
(C) Find a locksmith or someone skilled enough to pick the lock or make a new key.
Do now – add this vocabulary to your notebooks:
Electrical interference
When lots of electrical devices are operating in a small area, the electrical and radio waves
can cause other devices to work incorrectly.
Bit
Short for ‘b inary digit ’; a single bit of data, either a 0 or a 1.
Byte
A group of 8 bits of data, often used to represent a single character in a computer, e.g.
01010011.
What an error looks like
01000101 could become 11000101 – the first bit was flipped from a 0 to a 1
01000101 could become 00110101 – the second, third and fourth bits were flipped
01000101 could become 010 – the message was cut off
Why errors occur
Q2. Give 4 different reasons errors may occur.
HINT
Do now – add this vocabulary to your notebooks:
Database
A computer application that is used to organise data that can
then be stored, processed and accessed electronically.
e.g. a search engine
Artificial intelligence
Computers that can mimic (copy) the way humans think and
make decisions; e.g. spotting patterns, recognising images,
understanding speech.
Machine learning
Computer systems that are able to learn and adapt by
analysing patterns in data.
Image recognition
Computers identifying similarities in lines, colours, textures
and shapes of an image in an attempt to identify objects.
15 N OVEMBER
https://www.youtube.com/watch?v=DybczED-GKE