Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

REVISION_CA_T3

Grade 6
Getting online
Data can be transferred from one device to another wirelessly using radio
waves. The most popular methods of wireless data transfer are

Wi-Fi Bluetooth Cellular data


Characteristics of transmission methods
• Bandwidth
• The amount of data that can be transmitted within a certain amount of
time. E.g.:-Videos need a lot of bandwidth to play without buffering

• Transmission distance
• How far a signal can be sent using the transmission method

• Security
• It is crucial that security is concerned as some transmission methods can
be hacked more easily than others

• Interference
• Obstacles that slow down or stop the flow of data, caused by
electronic devices near to a network or by physical obstructions such
as walls.
WI-FI, Bluetooth, Cellular data
Transmission Bandwidth Transmission Security Interference
method distance

Wi-Fi 9.6 Gbps Up to 50 Wi-Fi passwords can Affected by


be hacked using
meters indoors Brute-force attack( a
walls and
program using lots of electronic
different equipment
combinations until a
password is cracked

Bluetooth 5 2 Mbps 40 meters Bluesnarfing, which Affected by


means a hacker
indoors connects to a device
walls and
without the user objects
knowing

Cellular data Between 8 4G-16km Security for both Affected by walls


and electronic
and 10 4G and 5G is equipment and
Mbps (4g) excellent landscape
AFL
1. Data can be transferred from one device to another wirelessly
using_____________________________

2. What are the four characteristics of data transmission methods?

_____________, __________, _________, ___________

3.Data
Thecan
most
bepopular methods
transferred of wireless
from one data
device to transfer
another are: using radio waves
wirelessly
________________________, __________________, __________

4. What is the difference between Brute-force-attack and bluesnarfing?


Answers
1. Radio Waves

2. Bandwidth, Transmission distance, security, Interference

3. Wi-Fi, Bluetooth, Cellular data

4. Brute-force
Data attack- from
can be transferred a program using
one device tolots of different
another combinations
wirelessly using radio waves
until a password is cracked
Bluesnarfing- means a hacker connects to a device without the
user knowing
IP
Addresses
• Each device on a network has an IP address assigned to it. IP stands for internet
protocol.

• It is designed to identify a device on a network, so that the devices can


communicate with each other.

• Eg: 192.124.2.123
• Ip address consists of 4 numbers, each separated by a full stop. Each
number is between 0 and 255.
Textbook
Server

• When you access content on the internet, you are accessing files that
are stored on a server.

• Server is a hardware device that stores and manages files and services
for a network.

• Servers are often grouped in one location, which is known as a server


farm.
AFL
1. What does IP address stand for?

2. Servers are often grouped in one location, which is known as a


____________________.

3. Explain what an IP address is.

3.Data
Whatcanisbe
a server and what
transferred fromdoes it do? to another wirelessly using radio waves
one device
Answers
1. Internet protocol

2. Server farm.

3. It is designed to identify a device on a network, so that the devices can


communicate with each other.

3.Data
Whencanyou access content
be transferred onone
from thedevice
internet, you are accessing
to another wirelesslyfiles
usingthat arewaves
radio
stored on a server. Server is a hardware device that stores and manages files
and services for a network
LO: To explain what the structure of a URL looks like and identify the different parts
Keywords: URL,Domain name,DNS,TLD

Textbook page 91-93


LO: To explain what the structure of a URL looks like and identify the different parts
Keywords: URL,Domain name,DNS,TLD

URL
• A URL, or Uniform Resource Locator, is used to locate a file
on a web server on the internet.
• They are easier to remember than an IP address
LO: To explain what the structure of a URL looks like and identify the different parts
Keywords: URL,Domain name,DNS,TLD

• The domain name is the part that changes, depending on which


web server you would like to visit using your web browser.

URL includes the domain along with additional information specifying


how to access a specific resource on that domain.
LO: To explain what the structure of a URL looks like and identify the different parts
Keywords: URL,Domain name,DNS,TLD

• A top-level domain (TLD) is the part at the end of the domain


name
Eg:- amazon.ae, amazon.in, amazon.com, amazon.de
DNS
• DNS(Domain Name System) is a system used
to translate a URL to an IP address, so that you
don’t have to remember the IP addresses for
web servers
• A DNS server stores a large database of URLs
and corresponding IP addresses
AFL
1. What does TLD stand for?

2. What does URL stand for?

3. What does DNS stand for?

4. Define URL.

DataExplain
5. can behow
transferred from one device to another wirelessly using radio waves
DNS works.
Answers
1. Top-level domain

2. Uniform Resource Locator

3. Domain Name System

4. A URL, or Uniform Resource Locator, is used to locate a file on a web


server on the internet.
Data can be transferred from one device to another wirelessly using radio waves
5.
• DNS(Domain Name System) is a system used to translate a URL to an IP
address, so that you don’t have to remember the IP addresses for web
servers
• A DNS server stores a large database of URLs and corresponding IP
addresses
Practice Questions
1. What is expanded form for: Difference between URL and
• TLD IP address. Give example
• IP Address
• DNS
• URL

2. What is the difference between brute force attack and


Bluesnarfing?
3. What is the difference between URL, Domain name, and
TLD,? Give example

URL Domain name TLD


https://Netflix. netflix.com .com
com

4. Name and explain the four characteristics of transmission


methods
5. Explain how DNS works
6. What is a server

You might also like