Lets communicate
1 DIFFERENCE BETWEEN FUNCTIONS AND FEATURES
A function has a purpose to do something
Features are extras on functions and are added to the functions
Difference between function and feature is that the feature is added onto
functions
E.G. Function: Texting
Features: SMS, MMS, Messenger
2 P.E FUNCTIONS
Sms
Mms
Internet
Colour screens
Pda (personal
data
assistance)
Fax
Camera
Bluetooth
Inferred
Memory
Radio
Mp3 player
Fm radio
Video games
Video calling
Gaming
Gps
E-mail
Media
Apps
3 FEATURES OF FUNCTIONS
Texting sms,
mms, qwerty,
alphanumeric.
Pda (personal
data
assistance)
Internet wifi,
3G, 4G,
electronic
communicatio
n, file transfer
protocol (FTP),
telnet, worldwide web
(www)
Colour screens
-
Fax speed,
printer, paper
size, paper
cutter, paper
feed,
autodialing.
Camera
pixels,
megapixels,
zoom.
Bluetooth
transfer
information
wirelessly.
Infrared
short distance
data,
Video games
Mp3 player
music storage
memory
Fm radio -
E-mail inbox,
outbox, sent
messages,
trash, folders.
Video calling
Gps camera,
Radio Epg,
pause rewind
and record
live radio, USB
connection,
multiple
alarms.
Gaming
4 DIFFERENT WAYS DIGITAL DEVICES CAN CONNECT TO
EACH OTHER
Wfi wireless, used around the house
Bluetooth -
5 GPS
What is it?
It stands for Global Positioning System.
GPS is a satellite based system that allows you to know your position
anywhere on Earth.
Why was it developed?
For the USA military to allow soldiers to know where they were regardless of
where there were.
How does it work?
Uses 'triangulation'. Distance from you and villain is calculated by machine.
Draw a circle to find the distance he could be from all directions. If more
machinery from different areas are used then another distance will be given.
Using all this you can make another circle which will eventually cross over
and pinpoint the location of the villain. Hence the word 'triangulation' - three
measurements can pinpoint a location.
So how do
satellites help?
If distance
between
yourself and at
least three
satellites
(preferably
four) can be
measured,
then your
location on
Earth can be
worked out. How accurately you can pinpoint your location depends on how
accurately you can measure the distances to the satellites. Commercial SatNav systems can measure to within a few metres.
Where is GPS used?
Uses:
* In cars - satellite navigation systems are becoming common
* Lorry Fleets: Used to track and locate vehicles
* Military - its original purpose, to help soldiers in the field.
* Shipping - to navigate the seas.
* Farming - to track crop growth and fertilizer application.
* Leisure - Mountaineers, hikers, explorers.
* Crime - offenders can now be 'tagged' with a GPS device to make sure they
stay where they should.
What is the future?
GPS has become so widespread in everyday life that some regions want to
control their own GPS for their citizens. For example the European Union
have been developing a similar system called Galileo.
Benefits
Drawback
Others will be able to locate your home to visit you
Stalkers will also be able to locate your home and
unwanted people will know how to find you
Fast Speed
Cellular devices can track other cellular device users
Helps improve mapping skills
Not cheap
You can be found easier if in danger or in an accident
People focus on GPS more than the road therefore more
accidents occur (GPS should be used as a back-up map)
It will lead you in the right direction
Needs good care
makes navigation
External power
Has panic buttons built-in
Needs batteries (handheld ones)
Plugs into your car cigarette lighter
6 STAY SAFE WITH INTERNET
http://
Green padlock in address bar
Green address bar
Copyright at bottom of page
7 THREATS TO PERSONAL INFORMATION
Computer Misuse Act
Computer misuse act = 1990 to stop unauthorised access from hackers attempting
to view and access or run programmes. Firewall stops hackers by filtering what
comes from internet to computer or network. Electronic infections: virus, email
virus, worm, Trojan horse. Antivirus prevents infection by regular updates.
Accessing unauthorised computers:
1. Access others work
2. Competitors designs
3. Delete files revenge
4. Steal money
5.
Act stops unauthorised access to computers (hacking)
1. Unauthorised access to computing material = offense
2. Accessing to commit offense or help others
3. Unauthorised modification to computer material
Hackers: Bored teenagers, Business rivals, thieves etc. (may be accident though)
Firewall stops others hacking. Filters data coming in through internet to
computer/network
Stops hackers by controlling computer and using machine as host to access or run
programs.
Electronic infections
Email Virus Attached to email. Virus copies itself and mail others in victims
address book
Trojan horse Computer program that claims to be one thing but does another
(deletes programs)
Virus Small piece of software that reproduces by attaching to other programs
Worm Small piece of software that uses networks and security holes to copy itself
and spread through network
Spyware/Adware Keep track of which adverts you click and send specific adverts
to your browser. Harmless but annoying
Phishing Attempt to gain personal info by deception (e.g. Send email pretending
to be bank)
Viruses: Copies itself without permission. Can damage data. Because it causes
computer code to be modified, it is illegal under computer misuse act. First British
virus writer prosecuted in 1995 for 18 months.
Prevent:
1. Anti-virus software updates regularly.
2. Dont download from unknown sources
3. Never run macros unless known source
4. Dont open attachments from people you dont know
Keeping data safe
Firewall Software that searches for viruses and removes any found
Encrypt Software that blocks access from unauthorised users
Online backup Data uploaded to online server somewhere else
Activity log Translate data into code that can only be retrieved by password or
key
8 COOKIES
Advantages of cookies:1. Cookies do not require any server resources since they are stored on the client.
2. Cookies are easy to implement.
3. You can configure cookies to expire when the browser session ends (session
cookies) or they can exist for a specified length of time on the client computer
(persistent cookies).
Disadvantages of cookies:1. Users can delete a cookies.
2. Users browser can refuse cookies, so your code has to anticipate that possibility.
3. Cookies exist as plain text on the client machine and they may pose a possible
security risk as anyone can open and tamper with cookies
9 COMMUNICATION PROTOCOLS
VoIP Voice over internet protocol (make telephone calls via internet) Headset and
speakers required. 3G connections good too.
POP3 Requires users to access emails via an internet mail account/mail deleted
from server when sent to client (useful when you only check email from one
computer).
IMAP4 Emails pushed to phone and copy of mail is kept on both server and client.
Can check email from multiple locations.
10 HEALTH ISSUES ASSOCIATED WITH DIGITAL DEVICES
Health Risk
Causes
Overuse injuries
Pressing buttons can
cause RSi especially for
thumbs
Obesity
Amount of time spent
playing on devices and
obesity is linked
Hours in same position
impacts posture and
spine
Muscle and joint problems
Eye strain
Eye become fatigued
when focusing at same
thing over same distance
for long time. Cause
blurry vision and
headaches
11 DIGITAL DIVIDE
Risks
Set sensible time limits
Take frequent breaks to stretch
Dont use same controller all the
time
Sensible time limits
Physical activity
Regular breaks to walk and
stretch
Adjust furniture to suit height
Use ergonomic chair
Adjust screen (contrast and
brightness)
Move furniture so light doesnt
fall on screen
Take gaze breaks: look at
objects in distance.
The digital divide refers to the gap between those who have access to technology
and those who do not.
The term 'digital divide' describes the fact that the world can be divided into people
who do and people who don't have access to - and the capability to use - modern
information technology, such as the telephone, television, or the Internet.
Impact of Global Digital Divide
Education: not being able to use digital devices does have an impact on an
individuals life when it comes to education. Children in countries such as Kenya
where they have limited/no access to the internet have a significant impact as they
arent able to access the specific information they need.
Academic Performances: According to the findings by Jerry Sun from University of
Southern California, computer skills are required for any college/university
student. With the lack of computer skills, students from low-income background
may not able to enter college/university or unable to finish even though accepted
by the college.
Are individuals who dont or cant use a digital device at a disadvantage?
DISADVANTAGES
Difficult to communicate with others
Harder to access information
ADVANTAGES
Less hassle
Brings back the feel of how life used to be
Less distracted
What do they miss out on?
Is it necessarily a bad thing?