USB
Common connector for peripheral devices with fast transfer speeds, the ability to connect multiple devices, power supply capabilities, and compatibility with computers.
SATA
Connector commonly used with internal storage devices, offering fast transfer speeds and compatibility with computer systems. However, it has a short range and does not supply power.
VGA
Connector used with display devices, compatible with older devices, and has built-in locking mechanisms. However, the signal can easily degrade, it has low resolution, and does not transmit audio signals.
HDMI
Connector used with display devices, capable of excellent resolutions and transmitting audio signals. However, it lacks a locking mechanism.
Ethernet cable
Used to transmit data between IT systems in a local area network. It is reliable, has a good range, and is compatible with computers. However, it has limited mobility, is not compatible with mobile devices, and cannot transmit data over long distances.
Fibre optic cable
Method of transmitting data between IT systems, commonly used in telephone networks. It offers excellent transfer speeds and range, as well as high security. However, it is expensive.
Infrared
Wireless connection commonly used with remote controls. It has low susceptibility to interference, but it is short-ranged, requires line of sight, and is slow.
Bluetooth
Wireless connection commonly used with peripheral devices. It is easy to connect, has low susceptibility to interference, and consumes low power. However, it is relatively slow and not very secure.
WiFi
Wireless connection used to access the internet, create a wireless LAN, and connect to peripherals such as printers. It offers relatively fast speeds, a long range, and low installation cost. However, it can be complex to set up and insecure.
Mobile broadband
Mobile connection used with mobile devices to access the internet on the go. It is widely available and easy to connect to. However, it is expensive and slower than WiFi connections.
Personal Area Network (PAN)
Network within the range of a single person, created wirelessly using Bluetooth or wired using USB. It is used to connect digital devices together, sync files/emails/calendars, transmit data with wearable devices, reduce cabling, automatically sync data, and secure data transfer.
Local Area Network (LAN)
Network that spans a relatively small geographical area, created using ethernet cables or WiFi. It is used to allow computers to share resources, share peripherals, access files flexibly, and centrally manage computers.
Wide Area Network (WAN)
Network that spans a large geographical area, created using dedicated network lines or VPN over the public internet. It is used to transmit data securely between different locations in a business, access files from different offices, and provide fast transmission.
Virtual Private Network (VPN)
Private network that runs across a public network, commonly created using an encrypted tunnel through the internet. It is used to transmit data securely between different locations without the cost of a dedicated private WAN, access work files remotely, and is cheaper than a WAN.
Protocol
Set of rules that defines a method for transmitting data between different devices over a network.
Email protocols
SMTP for sending emails, POP3 or IMAP for receiving them.
Voice & Video Calls over Internet protocols
SIP for establishing a connection, RTP for transmitting data, RTCP for providing feedback on data quality.
Web pages
HTTP for accessing web pages, HTTPS for secure access.
FTP
Commonly used for uploading web pages onto a server.
Secure Payment Systems
Relies on HTTPS for transmitting bank details. SET and 3D Secure are specific secure payment protocols for online transactions.
Data Transmission Security Issues
Vulnerability to eavesdroppers. Sniffing uses packet sniffers for unauthorized access. Spoofing pretends to be another computer. Wired transmission methods are more secure. Firewalls monitor traffic. Encryption makes data unreadable and prevents unauthorized access.
Bandwidth
Amount of data transferred from one computer to another in a given time period.
Latency
Time it takes for a data packet to transfer over a network.
Compression
Reduces file size. Lossy permanently deletes data. Lossless packs data into less space.
Hardware CODECs
Encode analog data into digital and decode digital data into analog.
Software CODECs
Compress audio and video data for transmission over a network. Compatibility issues may arise.
Cloud storage
Data stored remotely on servers. Used for portable data storage, syncing files across devices, sharing files, remote data backups, and remote working.
Cloud Computing
Accessing server resources over the internet. Used for accessing software applications, low maintenance needs, and supporting cloud computing.
Remote Working
Using VPN to connect to work LAN. Using remote desktop technologies to access work desktop from outside the office.
Factors to consider when choosing an online system
Security, cost, ease of use, features, and connectivity.
Interacting with Online Communities
Social media, blogs & microblogs, vlogs, wikis, chatrooms, instant messaging, podcasts, and forums.
Implications of Online Communities
User experience, user needs, cost, implementation, productivity, working practices, and security implications.
Employee & Customer Experience
Online communities should be easy to use, quick to load, available anywhere, and accessible to employees and customers with disabilities.
Customer Needs
Online communities must respond effectively and timely to customer needs.
Cost
Organizations may need to hire and train staff, pay subscription fees, and boost awareness of their online community.
Implementation
Time-consuming process of implementing an online community. Requires testing and may cause downtime.
Replacement or Integration with Current Systems
Data transfer and system compatibility may be required, leading to downtime.
Productivity
Improved communication but potential distraction from work.
Working Practices
New guidelines needed to ensure correct use of online communities by employees.
Security
Protection against hacking, data theft, and misuse of personal information.