Practice Examination 3
|
|
- Marcus Willis
- 5 years ago
- Views:
Transcription
1 Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination is 1 hour in duration and contains 50 marks. Please write your name at the top of this page and answer all questions on the following pages using the spaces provided. There are 16 questions in total. Question Max Marks Total 50 BTEC Level 1 / Level 2 ICT Unit 1 Page 1 of 5 ZigZag Education, 2014
2 Question 1 of 16 Music can be downloaded from a variety of sites either for free or on a pay-touse basis. Most sites allow users to listen to a short sample of the music, play a track (listen first before deciding to buy) or buy the track of their choice. Which of the following is an example of streaming? [1] Tick one box The ability to listen to music or watch a video/movie in real time without it being downloaded onto the computer Copying a file from the Internet to a computer so that it can be viewed at a later date Saving a music file in.wav format Sharing films and videos online with many people Question 2 of 16 A website is made up of many components; some provide content in the form of information and multimedia, while some enable navigation and ease of use. Select the two components that can be seen in the website below. [2] Tick two boxes URL Navigation Bar Podcast Web Browser RSS BTEC Level 1 / Level 2 ICT Unit 1 Page 2 of 5 ZigZag Education, 2014
3 Question 3 of 16 An ISP (Internet Service Provider) provides connectivity services and gives you access to the Internet in the form of dial-up or broadband connection; for either of these options there are wired or wireless connections available. (a) Give two advantages of using broadband over dial-up connections. [2] (b) Give one disadvantage of using a wireless connection. [1] (c) Give one advantage of using a wired connection. [1] BTEC Level 1 / Level 2 ICT Unit 1 Page 3 of 5 ZigZag Education, 2014
4 Question 4 of 16 can improve communication in large organisations, enabling staff to keep in touch with colleagues and with up-to-date information. Files, such as minutes of meetings, agendas, audio files and pictures, etc. can be attached to s and distributed. Give two issues connected with sending and receiving attachments. [2] Question 5 of 16 should be used responsibly and safely. Match the correct type of security threat to the descriptions below. [2] Virus Hyperlink.exe BCC If you don't recognise or trust a sender's address, never click one of these to open a web page Attached files with the following file extensions shouldn t be opened unless you trust the sender BTEC Level 1 / Level 2 ICT Unit 1 Page 4 of 5 ZigZag Education, 2014
5 Question 6 of 16 There are many websites providing information on a variety of subjects. (a) Give the name for a website that provides information which can be edited directly from a user's browser. [1] Tick one box Weblogs Wi-Fi Wiki WAP (b) Typically situated in an educational establishment, such as a school or college, this technology supports learning and teaching via interactive online resources and guidance. [1] Tick one box USB VLE RSS Vlog Question 7 of 16 A network is a group of connected digital devices, such as a home computer network, the Internet, a mobile phone network or a landline phone network. Match the labels to the correct description below. [4] WAN PAN P2P LAN Enables devices to communicate without an access point A network used to connect computers across different sites and locations Enables connectivity over a short distance (short-range radio frequency) to mobile devices A network used to connect computers within an office or building BTEC Level 1 / Level 2 ICT Unit 1 Page 5 of 5 ZigZag Education, 2014
6 Question 8 of 16 Computer systems require a standard method of communicating with each other when performing certain tasks. This is made possible by the use of protocols. Match the correct protocols to the descriptions below. [2] IP FTP TCP HTTP This protocol enables the transfer of files over the Internet This protocol is required in a website address (URL) Question 9 of 16 The Internet can be accessed via a PC, netbook, smartbook, smartphone, PDA, games console or Internet-ready TV. Give the name for the software that enables a user to access and interact with the World Wide Web. [1] Question 10 of 16 When a file is deleted it is not removed from the hard drive, unless overwritten by another file. Match the correct terms to the descriptions below. [3] Recovery Backup Recycle Bin This process must be carried out regularly to ensure that data is not lost in the event of hard disk failure This type of software attempts to restore deleted or corrupted files When items are deleted from a computer hard drive they are sent here BTEC Level 1 / Level 2 ICT Unit 1 Page 6 of 5 ZigZag Education, 2014
7 Question 11 of 16 Social networking websites provide chat rooms, forums, and instant messenger which allow you to post information about yourself and communicate with other users. When using these sites, users should be cautious about what personal information is disclosed as they may be viewed by complete strangers. (a) Explain what is meant by phishing. [2] (b) Explain what is meant by an Acceptable Use Policy. [2] It is important to consider whether confidentiality is needed when sending an to multiple recipients. (c) To ensure confidentiality of the recipient, in which of the following fields should the recipient s address be entered? [1] Tick one box To: Subject: Cc: Bcc: BTEC Level 1 / Level 2 ICT Unit 1 Page 7 of 5 ZigZag Education, 2014
8 Question 12 of 16 When opening an online account, you will be asked to complete a secure form with your details. Match the correct labels to the images below. [4] Required Field Verification Security Question Challenge Response REGISTRATION Username*: Password*: Confirm Password*: What is your pet s name? Answer*: Question 13 of 16 Technology is changing all the time and to stay safe individuals must keep up to date with new legislation. Match the correct type of legislation to the descriptions below [2] Digital Economy Act Data Protection Act Computer Misuse Act Acceptable Use Policy Protects personal data stored on a computer Protects against malicious damage or unauthorised use of a computer system BTEC Level 1 / Level 2 ICT Unit 1 Page 8 of 10 ZigZag Education, 2014
9 Question 14 of 16 Real-time communication means communicating with one or multiple users simultaneously in 'real time' (instant, as it happens). (a) Name one disadvantage of using instant messaging (IM). [1] Tick one box Users need an address or IM account to take part Pictures, photos and files can be exchanged Allows users to communicate for free over the Internet Can distract a user from studying or working (b) Explain web conferencing, giving one advantage and one disadvantage. [4] Question 15 of 16 Explain, using examples, what is meant by client-side processing. [3] BTEC Level 1 / Level 2 ICT Unit 1 Page 9 of 10 ZigZag Education, 2014
10 Question 16 of 16 The Privacy and Electronic Communications (EC Directive) Regulations 2003 is a law that prevents direct marketing, via telephone, SMS or , without consent. Jasmine is receiving a large amount of unwanted s. Discuss the measures Jasmine could take to prevent or reduce the amount of unwanted and unsolicited mail she is receiving. [8] BTEC Level 1 / Level 2 ICT Unit 1 Page 10 of 10 ZigZag Education, 2014
Bowie Senior Center Surfing the Web
Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful
More informationWhich one of the following terms describes the physical components of a computer system?
Which one of the following terms describes the physical components of a computer system? a. Hardware. b. Freeware. c. Software. d. Courseware. Which one of the following can slow down the computers performance?
More informationF9A0 04 (ESKINT2): Using the Internet 2
F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use
More informationModule 1 Concepts of Information and Communication Technology (ICT)
Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for
More informationKS3 Programme of Study Subject: Computing Year group: Y7
KS3 Programme of Study Subject: Computing Year group: Y7 Cybercrime 14/11/16 2/12/16 due AF1 Introduction - savings, set up folders, Health and Safety, Classroom Rules How to log on and secure passwords
More informationComputer networks 2013
Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages
More informationNETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)
NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) 1. An organization is planning to train all staff online rather than video-conference. Describe what is meant by a web conference. 2. Explain the differences
More informationST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology
Form 4 ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology Time: 1hr 30mins Name: Class: Please read the following instructions carefully: 1. Answer
More informationKULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop
KULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop Mark HALF-YEARLY EXAMINATION 2013/14 Levels 5-6-7-8 FORM 3 ICT TIME: 1h 30min Section A Question 1 2 3 4 5 6 7 8 Max. Mark 6 4 8 3 18 2 6 2 Mark Section B Question
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet
More informationGlossary
Glossary www.cybersmart.gov.au/cyberquoll CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009
More informationGetting connected. page 1 of 6. bbc.co.uk/webwise/accredited-courses/level-one/using-the-internet/lessons/getting-connected/getting-connected
Getting connected Connection methods Recently, the internet has come to dominate many people s lives, and nowadays you can access the internet via a wide range of devices: mobile phones, games consoles,
More informationTopic Course Activities
The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge
More informationDiscussion Ppt To work on completing questions you need your book and exercise copies
8.1 Physical Safety 8.2 e-safety Draw attention to: Book Chapter 8 Page 205 Three subtopics Handout Questions Three subtopics Class PowerPoint Three subtopics Discussion Ppt To work on completing questions
More informationECDL / ICDL Online Essentials Syllabus Version Training Plan Template
ECDL / ICDL Online Essentials Syllabus Version 1.0 - Training Plan Template Purpose This document proposes a training plan for ECDL / ICDL Online Essentials Syllabus Version 1.0. The training plan is illustrative,
More informationUnit A: Computer and Internet Basics
Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years
More informationWhich one of the following terms describes the physical components of a computer system?
Exercise 23 1.1.1 Which one of the following terms describes the physical components of a computer system? a. Hardware. b. Freeware. c. Software. d. Courseware. 1.1.2 Which one of the following is a portable
More informationUsing the Internet and the World Wide Web
Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Understand the difference between the Internet and the World Wide Web. Identify
More informationChapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts
E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson
More informationUMD: Using mobile IT devices
UMD: Using mobile IT s This is the ability to set up and use mobile or handheld s such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange
More informationTable of Contents. User Guide
Table of Contents Locate Laptop Laptop Tracking & Data Security 2 Feature: 2 Port Locker Stop Information & File Leaks 3 Feature 3 BitDefender Internet Security Secure Your Every Bit 3 Feature: 3 PROTEGENT
More informationChapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web
Chapter Topics Chapter 7: Computer Networks, the Internet, and the World Wide Web CS10051: Intro. to Computer Science Kent State University History of the Internet History of the World Wide Web Internet
More informationCommunications and Networks
Information Technology Skills (DUT 122) CHAPTER 6: Communications and Networks Miss Wan Nor Ashiqin Wan Ali School of Human Development and Technocommunication Objectives Overview Discuss the purpose of
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationESKIUMD2 (SQA Unit Code - F9AA 04) Using mobile IT devices
Overview This is the ability to set up and use mobile or handheld devices such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange and
More informationECDL / ICDL Online Essentials Syllabus Version 1.0
ECDL / ICDL Online Essentials Syllabus Version 1.0 Purpose This document details the syllabus for ECDL / ICDL Online Essentials. The syllabus describes, through learning outcomes, the knowledge and skills
More informationChapter 2 The Internet and World Wide Web
Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Explain how to access and connect to the Internet Explain how to view pages and search for information on the Web Describe the types of Web
More informationThere are two main types of computer networks:
Lesson 1 Internet 101 What is the Internet? Social networking refers to online services that allow people to interact with each other and stay connected with friends, family, and people around the world.
More informationDiscount Kaspersky PURE 3.0 internet download software for windows 8 ]
Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social
More informationGOZO COLLEGE BOYS SECONDARY
GOZO COLLEGE BOYS SECONDARY Half Yearly Examinations 2013-2014 Subject: INFORMATION & COMMUNICATION TECHNOLOGY Form: 4 Track 3 Time: 1 hr NAME: CLASS: INDEX NO: Instructions to Candidates Answer ALL questions
More informationBrochure for Information Security
福山大学 Application of Tools for Information Security for a fulfilling Life at University Brochure for Information Security Raising the Quality of Learning Fukuyama University Information Service Promoting
More informationA network is two or more computers, or other electronic devices, connected together so that they can exchange data.
Computer Networks What is a Network? A network is two or more computers, or other electronic devices, connected together so that they can exchange data. For example; a network allows computers to share
More informationSoutham College Computing & ICT Department. Summer Project
Student Name: contact: sycamore.s@welearn365.com Southam College Computing & ICT Department Summer Project This booklet provides several tasks for you to update your current knowledge and learn new concepts
More informationMicrosoft Office Live Meeting
Microsoft Office Live Meeting Add-In Pack Set-Up Guide InterCall, a subsidiary of West Corporation, in partnership with Microsoft, provides Conference Place SM web conferencing services. Because Conference
More informationThe process by which a user can associate specific permissions to each username.
Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost
More informationWireless. Networkin. cpue. Indianapolis, 800 East 96th Street, Indiana 46240
Wireless Networkin cpue 800 East 96th Street, Indianapolis, Indiana 46240 iv Table of Contents Introduction 1 How This Book Is Organized 3 Conventions Used in This Book 4 Windows or Mac? 4 Web Page Addresses
More informationComputer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance)
COMPUTER NETWORKS Computer Networks A network is two or more computers connected together to allow them to share information and resources. Network connections are created by Cables Radio signals (wireless/wifi)
More informationCommunication Technologies
Unit 29: Communication Technologies Unit code: F/601/7264 QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to ensure learners understand the
More informatione-quals Unit Syllabus
e-quals Unit Syllabus Level 2 Using the internet for finding, selecting and sending information 7266-025 www.cityandguilds.com/e-quals07 March 2007 Version 1.0 About City & Guilds City & Guilds is the
More informationTotal Mark out of 35
University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:
More informationECDL / ICDL IT Security. Syllabus Version 2.0
ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationContents at a Glance
Contents at a Glance Introduction... 1 Part I: First Steps with Your Laptop... 5 Chapter 1: Discovering the Laptop Advantage...7 Chapter 2: Buying a Laptop...19 Chapter 3: Setting Up Your Laptop...37 Chapter
More informationChapter 002 The Internet, the Web, and Electronic Commerce
Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially
More informationHIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996
HIPAA Privacy & Security Training HIPAA The Health Insurance Portability and Accountability Act of 1996 AMTA confidentiality requirements AMTA Professional Competencies 20. Documentation 20.7 Demonstrate
More informationA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific
More informationSECURE USE OF IT Syllabus Version 2.0
ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationPreview from Notesale.co.uk Page 2 of 88
Contents About this Guide Information for Students... Be Revise-Wise How to Use this Guide to Do Well in Your Exams... Revision Checklist... 4 1 Data and Quality of Data... 5 1.1 Encoding and Storing Data...7
More informationTechnology Safety Quick Tips
Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More information3 The Internet and the electronic mail
3 The Internet and the electronic mail The chapter concerns the following; ² Internet operation ² Internet services ² Searching information ² Uniform Resource Locator-URL ² IP addresses ² Domain name ²
More informationThe exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names
The exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names Lets Communicate - Chapter 1 : Mobile Phone Features Smart Phone A phone offering
More informationBasics. IT services for postgraduate resarch students
Basics IT services for postgraduate resarch students Get started Activate your computing account We re looking forward to welcoming you to the University of Liverpool! This guide will help you to understand
More informationwe do Windows For more information about Windows, see Windows Basics under Help and Support in the Start menu.
STARTERGUIDE Thank you! Thank you for your purchase! We want to make your experience a satisfying one, so we ve put together tips to help you get started with your Gateway computer. Contents Getting started
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationImportant Notice. Registration Numbers are obtainable from ICDL/ECDL Training and Testing Centres or directly from Specto j
Important Notice All candidates who follow an ICDL/ECDL course must have an official ICDL/ECDL Registration Number (which is proof of your Profile Number with ICDL/ECDL and will track all tests taken).
More informationINFORMATION COMUNICATION TECHNOLOGY SKS 1362
INFORMATION COMUNICATION TECHNOLOGY SKS 1362 Lecture Six http://www.dr-qais.com Facebook: Dr Prince Badakhshi 1 2 It is a kind of business that buying and selling of products or services are conducted
More informationTable of Contents 1 CREATING AN ACCOUNT Sign up Download Skype Sign in Test Audio and Video...
SIGBI GUIDE - SKYPE For the purpose of this document, references to Soroptimist International Great Britain and Ireland (SIGBI) Limited and Soroptimist International may be written as SIGBI and SI only.
More informationLevel 3 Cambridge Technical in IT 05838/05839/05840/05841/05842/05877 Unit 1: Fundamentals of IT
Level 3 Cambridge Technical in IT 05838/05839/05840/05841/05842/05877 Unit 1: Fundamentals of IT Monday 9 January 2017 Morning Time allowed: 1 hour 30 minutes You may use: a calculator INSTRUCTIONS Use
More informationManagement Information Systems
Telecommunications, the Internet, and Wireless Technology Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards Foundation,
More informationDiscovering Computers Your Interactive Guide to the Digital World
Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Discuss the evolution of the Internet Identify and briefly describe various broadband Internet connections and
More informationECDL / ICDL Online Essentials Syllabus Version 1.0
ECDL / ICDL Online Essentials Syllabus Version 1.0 Purpose This document details the syllabus for ECDL / ICDL Online Essentials. The syllabus describes, through learning outcomes, the knowledge and skills
More informationAvailable Instructor Resources Resource File Name Found
Instructor s Manual Exploring Computing Concepts 2016, Chapter 1: Getting Started with Computer Concepts Student Data Files Solution Files Answer Keys Matching Multiple Choice Concepts Checks Scorecards
More informationStonelaw High School. Computing Science. BGE - Computer Systems
Stonelaw High School Computing Science BGE - Computer Systems Contents Computer Systems... 3 Computer Systems... 3 Hardware & Software... 3 Data Representation... 3 Representing Positive Integers... 3
More informationThe Internet. and the World Wide Web
The Internet and the World Wide Web Discussion What is the internet? What do you use the internet for? History Advanced Research Projects Agency created ARPANET in the late 1960s. 1970s more universities
More information1GHz Dual Core Processor Extreme Speed & Range
Performance & Use AC1900 Extreme combined WiFi speed Up to 1900 Mbps 1GHz dual-core processor 1900 DUAL BAND 600+1300 RANGE Fast VDSL/ADSL modem for fibre broadband Compatible with VDSL, VDSL2, ADSL, ADSL2,
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file
More informationPUPIL ICT ACCEPTABLE USE POLICY
PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file
More informationA Comprehensive Guide. IC3 - Module 1: Computing Fundamentals
Appendix A A Comprehensive Guide to IC 3 IC3 - Module 1: Computing Fundamentals Standardized Coding Number Objective 1.1 Objectives & Abbreviated Skill Sets Page Identify types of computers, how they process
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationA the speed at which data can be downloaded. B the countries in which the phone can be used. C the data services the phone supports
Q1. The phones in Figure 1 use different network bands. The network band of a mobile phone limits: (1) A the speed at which data can be downloaded B the countries in which the phone can be used C the data
More informationBlackBerry Z30 Smartphone. Version: User Guide
BlackBerry Z30 Smartphone Version: 10.3.3 User Guide Published: 2016-06-22 SWD-20160622155143665 Contents Setup and basics... 6 Your device at a glance...6 What's different about the BlackBerry 10 OS?...7
More informationGrand Avenue Primary and Nursery School ICT Data management. Contents
Grand Avenue Primary and Nursery School ICT Data management Contents 1. Acceptable Use Statement 2. Transfer and Offsite Use of Sensitive Data 3. E-safety 4. Declaration Introduction These three policy
More informationIT JARGON BUSTERS NETWORKING TERMS
IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or
More informationELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12
ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.
More informationBring Your Own Device Policy
Bring Your Own Device Policy 2015 City of Glasgow College Charity Number: SCO 36198 Page 1 of 9 Table of Contents 1. Introduction... 3 2. Purpose and Aims... 4 3. Scope... 4 4. Policy Statement... 5 4.1
More informationSystems and Principles Unit Syllabus
Systems and Principles Unit Syllabus Level 2 Networking Principles 7540-002 www.cityandguilds.com October 2010 Version 2.0 About City & Guilds City & Guilds is the UK s leading provider of vocational qualifications,
More informationSeminar 7 Title: IT architecture
IMS 1502 Studio 2: Information Systems Foundations 2 Seminar 7 Title: IT architecture Seminar 7.1 - Sem. 2, 2005 Seminar Objectives The aim of this seminar is for students to: develop an understanding
More informationSTUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY
STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies
More informationClass X Subject : IT (Vocational) Chapter -1 Ouestion / Answer
Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware
More informationIntroduction to the Internet. Part 1. What is the Internet?
Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected
More information09-Jan-17. Objectives Overview. The Internet. Objectives Overview. Evolution of the Internet. Evolution of the Internet. Discovering Computers 2012
Objectives Overview Discuss the evolution of the Identify and briefly describe various broadband connections and state differences between broadband connections and dialup connections Describe the types
More informationInternet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationGoing Mobile at Northwestern
NUIT Tech Talk Going Mobile at Northwestern May 17, 2011 NUIT Support Center staff Today s Agenda Popular Mobile Devices iphone/ipod Touch Android Phone Windows Phone 7 BlackBerry Laptops, Tablets, and
More informationStaying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.
Staying Safe Online My Best Internet Safety Tips and the AgeWell Computer Education Center Welcome to our first Webinar of 2017! Agenda o How to use the Webinar Room o Upcoming CEC Classes o My tips for
More informationVocabulary Bank organized by module
Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software
More informationE-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition
E-commerce 2014 business. technology. society. tenth edition Kenneth C. Laudon Carol Guercio Traver Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall Chapter 3 E-commerce Infrastructure:
More informationE-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition
E-commerce 2014 business. technology. society. tenth edition Kenneth C. Laudon Carol Guercio Traver Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall e Commerce Course : Chapter 3 E-commerce
More informationChapter 2 The Internet and World Wide Web
Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet Recognize how Web pages
More informationTechnology in Action Complete, 13e (Evans et al.) Chapter 3 Using the Internet: Making the Most of the Web's Resources
Technology in Action Complete, 13e (Evans et al.) Chapter 3 Using the Internet: Making the Most of the Web's Resources 1) The Internet is. A) an internal communication system for businesses B) a communication
More informationTable of Contents. Introduction. Buttons of the table. Using the touchscreen. Using the keyboard. Connecting to Wi-Fi. Applications.
Table of Contents Introduction Buttons of the table Using the touchscreen Using the keyboard Connecting to Wi-Fi Applications Deleting Apps Email Skype Extra tips Introduction to using an Android Tablet
More informationFeatures Guide. Get the most from your phone.
Features Guide Get the most from your phone. It s all on the Now Network. This Features Guide has everything you need to get the most from your new Sprint phone. Just go directly to any feature that interests
More informationOnline Communication. Chat Rooms Instant Messaging Blogging Social Media
Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media Advantages: Reduces cost of postage Fast and convenient Eliminates phone charges Disadvantages: May be difficult to understand
More informationwe do Windows For more information about Windows, see Windows Basics under Help and Support in the Start menu.
STARTERGUIDE Thank you! Thank you for your purchase! We want to make your experience a satisfying one, so we ve put together tips to help you get started with your Gateway computer. Contents Getting started
More informationNEO 4.5. User Manual
1 NEO 4.5 User Manual Table of Contents Safety Information... 3 Appearance and Key Function... 4 Introduction... 5 Call Functions... 6 Contacts... 7 Messaging... 8 Internet Browser... 9 Bluetooth & Wi-Fi...
More informationONLINE SAFETY. Messaging, , Vlogging and Sexting
ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.
More informationGetting to Know Your Mobile WiFi
Quick Start Thank you for purchasing the O2 4G Pocket Hotspot Mobile WiFi. Mobile WiFi allows you to connect to high speed mobile broadband from any Wi-Fi capable device. This document will help you understand
More informationWhich type of computer is used to operate large corporate systems and databases
Module 1 Sample Part-Test 1.1 This is a sample test only. Test 1 1.1.1 Which type of computer is used to operate large corporate systems and databases 1. Desktop computer 2. Personal Digital Assistant
More information