unit 1 - learning aim a

the online world

Online Services

Communication - You can use this by email or messaging , news groups, social networks. It can be used for talking to friends on skype world wide, this reduces the need of travel and help with sustainability. You don’t need to financially travel to talk to someone.

Real-time information - You can use this by timetables, news, sport updates, weather reports and travel news. You can check the airport website for estimated arrival times of flights. Provides up-to date information on airports or bus departures, companies can use this to see the feedback on customers to advertise their effectiveness of their business.

Commerce - You can use banking, auctions, online sales and purchases and publishing. An example is through selling something on a service such as amazon, this allows users to electronically transfer transaction without the need to travel

Government - You can use this by Tax returns, e-voting, applications for grants or benefits. For instance you can apply for your provisional license, save times and it is more coinvent, save time when visiting to the post office and you can take your time filling in and check for some errors.

Education - Online learning, training, tutorials and manufacturing. You can use google the internet to research for the assignments or resources, allows you to research at home and can do the training at home.

Virtual Learning Environment (VLE) - Moodle, Kahoot. For example, your school will use VLE to be access resources and assignments to complete, which is cost - effective for the school and it is easier for the students to learn and complete work

Businesses - Business networks, collaborative working, video conferencing. For example, using a price comparison website is an example where you touch on business usage, which allows you to get the best price for purchases.

Entertainment - Multi - user games, radio, TV players and video streaming. For instance, playing a game with other people over the internet, which enhances the gaming experiences and confidence to engage people you don’t know.

Downloaded Services - Music, films, new software, software upgrades, games. For instance, downloading music such as apple music or Amazon, means purchasing easier and more affordable.

Online advertising

It is used to promote and market someone business to attract and engage the audience.

  • Search engine results pages - companies can register with the bigger search engines so that their websites appear high up in the list of keyword searches or pay links that appear when a user does a search

  • Banner and pop - up advertisements - These are pop up advertisements that appear at the top of web pages or pop up on web pages, these are often animated to catch their attention.

  • Email Marketing - uses email to send advertisements to customers, however they might see this as spam if it sent as an unsolicited bulk emails - emails that are sent to a large number of people who haven’t requested them.

  • They need to make sure to capture their attention of the target market through the use of design features and it is easily accessible, they need to retains consumers interest, by demonstrating ads that relevant to them.

Pay - per click advertising

It is a form of advertising that involves websites or web pages hosting ads for other companies, of a surfer clicks on a ad, they will be redirected to the advertiser’s website, the website or web page provider will receive payment for every ad is clicked on. This is known as the affiliate model.

Online data storage

Data storage is another type of online service, many organizations are providing facilities for you to store and back up your data on their computers, and to make files available to share with others, this is known as cloud storage. Data backup is a method retrieving files, these can be retrieved if a disaster occurred.

Online documents

Compressing files

Working with online documents means that local files need to be frequently uploaded for sharing or downloaded to be used for local processing, files may be too large to send to someone to fix this problem we have to compress this file which means reduce the size before the transmission and then expanded in transmission. A common method of doing this is converting it to a zip file.

There are many different algrothrims for doing this compression, the last iteam in a zip file is an index, which shows the placement of each of the data files and allows other files to be added, quite often the zip file will also contain some program code to allow the files within the zip file to be unzipped. An example of a zipfile is WinZip.

Advantages of online software

  • You allow many people as possible to share a version of a document and work on it the same time. You can also access the content; anywhere, where there is a connection, different devices, and on different operating devices.

  • online documents can also have automatic backups, backing up files means you can save a copy of that file, and can always go back to that version if you lose the current version

  • some software programs all ready have automatically make a copy of that file.

Controls over Online Documents

Version control

This is important when users are sharing online documents, as all users need to be working from most up-to date version of the same document and one of the simplest ways implementing version control is to allow just one user to open a document, or part of a document, when one user open the document and someone else opens it, it will say it has been locked. It is only unlocked when the original user has completed updating the file and has closed it again.

Other methods of version control include the software allocating the latest version number, showing the time and identity of the person making changes. If, for any reason the document get corrupted or loss of information it is possible to go back to a commonly agreed version number.

Levels of access and file permissions

The system admin within an organization can control the level of access for users have to a particular document, they can allocate access to individuals or particular groups of documents by using file permissions, some users may only to be read documents, some allowed to read and edit them and some will allow to add documents and some will be able to delete documents.

File permissions can be used to restrict access to certain documents and to restrict what can be done to them.

  • Read - only access

  • Read/Write access

  • Full control

Online communication

People who are literate, and have the equipment, can form groups or societies online, these groups are known as online communities and they provide a place for people who have similar interest, and can make a network of friends also increase people socializing and knowledge. Sometimes, the communities exist in a virtual world, where this is an unreal world created by a computer. An example, is the Hogwarts Legacy is where the game is based on the films, for people relating and interacting with the game.

Communicating online requires a special behaviour or etiquette, known as netiquette. This is a set of rules designed to prevent abusive behaviour online, if users break this rule, users can report them.

Information Exchanges

Online communities make the use of social media to publish, access and exchange information.

  • Web logs (blogs) - these are online journal that expresses their views and thoughts, for people to read and gain knowledge. This can be a food blog or a topic related to you.

  • Microblogging sites - these allow sites users create and exchange short text entries. For instance, Twitter (X)

  • Wikis - these are websites to provide information where users can edit and extend information, this allows users to share and receive information. An example, is wikipedia.

  • Chatrooms - Online communication allows people to be in their group of similar interest, people can create an network of friends, debating a certain topic, they can take part in discussions and shows in real time.

Podcasts

This is a range of audio files or video files that can be downloaded from the internet, or it can be from you speaking towards the audience of whatever you like. You can podcast on spotify or a music app. Whereas, a video file recorded can be known as a vlog that can be published on the internet, such as Youtube.

VLE - Virtual Learning Environment

A school or college community will use VLE to distribute resources, support learning and assess progress online. The VLE can provide assignments, tests, resources, chat rooms of online learning. It is also a productive school learning, as students can complete work online where the teacher assigned it. The system also tracks and records learners progress and performs other class management. The system can work in real time, with online learning.

Social networking websites

The sites such as; Facebook, Twitter, Linkedin, Google, etc. Allows members of the online community to interact and communicate by setting a profile, users can add links, photos and videos, music and their blog links.

Voice over Internet Protocol (VOIP)

This allows people to interact in real time using voice/video conferencing, and it can be anyone worldwide,our there is not cost and it does not take time to set up. The main services in VOIP is skype and zoom etc. Being able to talk to your friends and family is important to spend time with, and reducing the need the travel you can save money and talk from home, this can be super important for meeting, interviews, tuition etc.

The limitations in VOIP; Reliability, Voice Quality and Security

Cloud computing and ubiquitous computing systems

Cloud computing and cloud storage

Cloud computing means using computer services an another organization computer, which are known as hosts, these services are provided by an organization known as hosting companies. For example Microsoft, Google and Rackspace. Cloud users can access software, data and storage on the host computers, which will be at a remote location, users do this by through a web browser or a mobile app, without ever directly accessing the servers - (runs the computer of other computers on the same network) that information is stored on.

Cloud Storage means that when a computer uses services provided by another organization’s computer system.

The benefits and some concerns about Cloud computing and cloud storage

  • Cost and convenience - You only pay for the storage you have used, you don’t have to provide and maintain the hardware locally.

  • Availability - Data and files may still be there if saved and there is an internet connection

  • Security of data - as the files are being stored by the host, you have no control over them, need to be aware of the TC’s.

  • Reliability of the network - you need to get through the host, to gain access and process the data

  • Software - the host may not be using the latest, fastest and secure version

  • Potentially lower performance - The speed of retrieval of data may be slower than it would be on a local database held in a house

Ubiquitous computing systems

Ubiquitous means existing everywhere, processors can be embedded in any device, including clothing, appliances, vehicles, buildings and people, to connect them to the internet so that the data generated by the processors will be ready available. Ubiquitous computing systems refer to the idea that computing is everywhere and seamlessly integrated into our daily lives.

Radio Frequency identification (RFID)

Radio Frequency Identification (RFID) is a technology that uses radio waves to wirelessly transmit data between a tag or label attached to an object and a reader. In simpler terms:

  • Tags or Labels: Objects are equipped with small tags or labels containing electronic information. These tags can be attached to items like products, cards, or even animals.

  • Radio Waves: RFID uses radio waves to communicate between the tag and a reader device. This communication happens without the need for direct line-of-sight.

  • Reader Device: A reader or scanner sends out radio signals, and when an RFID tag is within range, it responds by transmitting its stored information.

  • Identification: The information on the tag could include a unique identifier or other data related to the tagged object. This enables quick and automatic identification of items.

  • Applications: RFID is used in various applications, such as inventory management, access control systems, contactless payment cards, tracking shipments, and even in some identification cards or passports.

Applications of Ubiquitous computing

  • Smart Homes: Home automation systems leverage ubiquitous computing to control and monitor various devices, such as thermostats, lights, security cameras, and appliances, creating an interconnected and responsive living environment.

  • Wearable Devices: Devices like smartwatches and fitness trackers incorporate ubiquitous computing to collect and analyze data related to health, fitness, and daily activities. These devices often communicate with smartphones or other systems to provide real-time feedback.

  • Healthcare: Ubiquitous computing is employed in healthcare for remote patient monitoring, smart medical devices, and health tracking systems. It allows healthcare professionals to access patient data in real-time and provides timely interventions.

  • Smart Cities: Ubiquitous computing contributes to the development of smart cities by integrating technologies like sensors and IoT devices to enhance urban services. This includes smart traffic management, waste management, energy efficiency, and public safety.

  • Retail: Retailers use ubiquitous computing for inventory management, customer tracking, and personalized shopping experiences. RFID tags, beacons, and other technologies help streamline operations and improve the overall shopping experience.

  • Education: In education, ubiquitous computing supports interactive learning experiences through devices like tablets and interactive whiteboards. Students and educators can access information from various locations, fostering collaborative and flexible learning environments.

  • Industrial Internet of Things (IIoT): Ubiquitous computing plays a crucial role in industrial settings by connecting sensors, machines, and control systems. This facilitates real-time monitoring, predictive maintenance, and optimization of manufacturing processes.

  • Transportation: In transportation systems, ubiquitous computing is used for intelligent traffic management, real-time tracking of vehicles, and smart public transportation solutions. It contributes to improving efficiency and reducing congestion.

  • Entertainment: Gaming and entertainment platforms leverage ubiquitous computing to provide immersive and interactive experiences. Virtual reality (VR), augmented reality (AR), and mixed reality (MR) technologies are examples of this integration.

  • Emergency Response: Ubiquitous computing aids emergency response systems by providing real-time data from various sources. This includes monitoring environmental conditions, tracking the location of emergency personnel, and managing resources during crises.

  • Financial Services: Ubiquitous computing is used in the financial industry for mobile banking, contactless payments, and fraud detection. It enhances the convenience and security of financial transactions.