ADSL: Asymmetric Digitial Subscriber Line - Fast data transmission over copper telephone lines.
Fibre: data carried by thin plastic/glass fibres - fast, no delays due to quick light pulses.
FTTB: Fibre to the Business
FTTH: Fibre to the Home
Installation and use of fibre cables for high speed internet access
Limitations:
Not portable, requires telephone line or fibre connection
expensive to install/maintain
may not be accommodated in your area
portable and mobile (3G, 4G, LTE)
3G - "G" generation
4G/LTE - make use of infrastructure of cellular networks (cellphone tower) EG: MTN/Telkom
enables devices with 3G/4G/LTE to offer high speed interent acess
phone can also act as a modem for other devices (personal hotpots)
Wireless Fidelity
uses radio waves to transmit data
personal hotspot - phone to another device
connection range is small (3-5m)
some hotspots are free - airports, gym, library
WISP: Wireless Internet Service Provider, subscription or pay per connection made to other hotspots
Worldwide Interoperability for Microwave Access
upgrade to Wi-Fi
First of the 4G technologies - faster than 3G
greater operating distance and guarantees your connection once its made (more secure)
connects over KMs
provides secure broadband access for business/home users
can still be used in an area with no fibre
speed = faster than Wi-fi
range = 10-100x greater than Wi-fi
Expensive to install and operate
Wimax is competing against an existing technology
where individuals/businessese make posts for others to see/read.
form of apps/notifications
restrict time spent on socials
restrict access (passwords)
careful what you post
easy and cost effective form of communication
marketing tool
send/receive messages and able to upload
allow people in different areas to connect
risk of identity theft
loss in productivity
Voice Over Internet Protocol
able to make phonecalls using LAN (local area network)/internet
voice is transmitted over a network
EG: Skype, Teams, Whatsapp call
check time zones
good headset + microphone
use video only when necessary (lots of data)
cheaper than normal phone call - data/international calls
software mostly free
video + audio possible
able to transfer files
audio quality is lower than normal call - slow internet
data usage
hold meetings from different locations
need speaker, mic, camera
test sound/video before joining
protect privacy
save costs - travelling
able to hold a conference last minute
video-audio can be poor quality - internet connection
expensive to set up
data usage
online environemnt (virtual room), people chat/message in real time
EG: Whatsapp/Facebook
dont give out personal info
dont cyberbully
avoid flame wars: exchange of insults/comments
chat with more than one person at a time
apps can be used on various platforms (Android/IOS)
catfishing
cyberbullying
anti-social behaviours
E-Commerce: general business transactions that involve communication across the internet
safe website should have HTTPS or the lock above the website
payment methods through:
credit cards
PayPal
EFT (Electronic Funds Transfer)
e-banking / online banking
using the bank forum on a web browser instead of in person or app
various transactions can take place
convienience - 24/7
safer - no large sum of money in on person
transactions often faster and cost less - no bank charges for using a card
internet connection required
be aware of phishing/scamming
how online shopping works:
create an accoint (username and apssword)
browse (add to cart)
checkout - pay with EFT or card
make a booking/movie etc
EG: booking.com, takalot, Superbalist
convieneince (24/7)
prices can be cheaper than in store
business reduces overhead costs
businesses dont need to keep large stock
better to see goods/tryon etc
delivery and import tax - takalot min spend of R500 for free delivery and Shein import tax
online harassment
spread of rumours, bullying through onljne communication methods
involves aggression, repetitive negative actions
often a group activity
done by an individual that is obsessed with someone
use technology/social media to track activities
done to harass, control and intimidate
Software written with negative intensions.
destructive software - viruses
annoying software - adware
detected in 2 ways:
leaves a trace - virus defintion/signature: pattern than uniquely identifies the malware
suspicious actions - known software trying to make changes
detects viruses by scanning the computes files and memory and matches patterns to a database
EG: AVAST
keeps a list of websites known to contain and distribute spyware
works similar to antivirus
websites pretending to be legit to gain personal information or steal money
redirecting a user to a fake website through links, usually by email, to install malicious software on the computer
a user/hacker watching movements on a computer to gain passworks and information
user/software that tracks key strokes to gain access to a computer through pin/password
barriers to prevent communication/access to a computer/viruses to be sent
stops access to connection (internet)
EG: Norton Internet Security