[Music] hi there grade 12s and welcome to our uh term two review or term two um revision session where we're looking at the theory models that we've covered in this term so let's jump in and get started now what we've done so far in term two we looked at what the internet is and by now we should know that definition please this is something that does come up we've also looked at our wide area network so remember this is a network that spans many geographical areas and you'd have to probably give an example of that as well we've got our internet connections things like what our isp is so you must be able to tell me what an isp is give an example and then you know what some of the services are that they actually render and yeah they mention them so please that that is important okay um the criteria for certain internet connections now this comes up usually in the scenario setup so they'll tell you that somebody is going to be setting up a home office or you know they set it up a new computer lab some little story like that and you would then have to work out well what is going to be best for the scenario do they need a wired connection do they need a wireless connection do they you know need certain hardware here we're talking specifically in terms of okay well they need an internet connection does it have to be kept in other words does it need a limit it doesn't need to be mobile um how much data do they need you know what's difference between upload speed and download speed what is meant by bandwidth for that matter what is meant by shaped and unshaped and throttling now when i and just to give a simple example when i throttle someone and i grab you and i choke you i'm choking the life out of you right so if i take a connection that's like a cable and i throttle that it means i'm limiting the speed in general when i shape it it means i'm only going to allow you know i'll give priority to certain things during certain periods of time so let's say your line is shaped between 5 pm and 7 pm that means that priority will be given to certain items maybe downloads as opposed to uploads if it's unshaped it means you can do whatever you want okay the speed is not limited or messed with at all please know the difference between adsl and fiber these are your wired connections okay some of the advantages and disadvantages again i work on the rule of two just knowing at least two of those okay um they go into some more detail on that that's fine you can read through those things then on the wi-fi side what a hot spot is okay please what your hot spot is what your router does at home because remember your router has those antenna some of them don't even have the antenna but they provide a wireless network environment in that area as well so here they mentioned internet access using smartphones and tablets people prefer data communication that is always on fast and reliable and hassle free so again i'm just i'm just breezing through some of the things um that they do mention here yeah okay obviously given the newer technology they're going to talk about 3g 4g they're going to talk about 5g it's just the next generation which means it's faster okay that's the main thing behind it so just know that then your wi-fi versus cellular okay you'll have to work out again based on the scenario what is going to be best for the individual the answer about internet services things like real-time messaging guys we know what this is not even going to go there not even going to go there we already know what that is some of us too much voice over internet protocol this is where we having our voice been transmitted over the internet so things like you know skype your whatsapp calls what's up video calls as well uh you know things like zoom or anything where i'm transmitting voice and video over the internet and you can work out again some of the advantages and disadvantages of that as well then we've got video conferencing now this is a very interesting um little topic here because there's a lot that goes with it i mean think of me setting up everything that i that i have here what do i have to i've got my laptop on this side i've got my camera over here i've got an internet connection if i want to stream this i've got to look at well how many people are going to connect what sort of lighting do i need what sort of camera do i need what sort of hardware do i need i've got a mic here as well so you know so we can get good audio those are all the things these days that i've got to look at when it comes to video conferencing so as much as it's you know something that's easy to set up and things you need to look at all the scenarios all the options and they will ask you things like that so know your advantages know your disadvantages but also not to put into practice what you've learned so far for a scenario like that then also your good practices when it comes to that obviously you don't want everything in the dark you don't want it like no we don't want that right cloud computing what that is means we're working with the software online so like your gmail right amazon web services your google drive and what some of the you know typical advantages and disadvantages of cloud computing biggest one is that works beautifully but unless you have an internet connection can't use it we dealt with online storage i think that was even with the grade 11s so guys use especially grade 12 and use that revision from grade 10 grade 11 up to grade 12 and you'll see how the one builds on the other file sharing we know this by now already many of us use you know google drives and things like that so it's very easy to share access to the information online nice and fast but you know not always suited for large files and again limited to those who have an internet connection okay so yeah but when we're using email specifically please no i don't i think it has a limit of like five or six migs and that's not a lot but you'd have to compress and that's why we talk about compression software you know compress the files in order for it to actually go through so yeah with emails you also are restricted to the number of recipients so these are just some of the things that you need to pay in mind we have spoken about ftp or fi file transfer protocol um you know ftp servers before so that you should know your grid computing just know the definition and an example okay definition an example you'll be fine with credit computing all right um let's see [Music] government internet services again yes you can go through this you would have done these modules by now already um they might ask you about the digital divide right between those who know what's actually happening with us and those who have no idea and and that gap is sort of unfortunately growing because a lot of people are still not on these services and sometimes it's because of finances sometimes because the data is too expensive that they can't go there through the cost of living might be too expensive for people to move that route and so only a select group are actually doing it so there are many many different factors all right 2.2 dealt with the dangers of computer crime and i'm not going to go into all this we've done this before so please the term social engineering very important malware very important okay the techniques you need to know your techniques what is fishing what is the difference between fishing and farming okay the two can work together but you need to be able to identify the difference between the two fishing and farming right click check-in this is one that's been addressed these days so click check-in you're clicking on it and it appears to take you to one thing but it's actually taking you somewhere else spoofing the forgery of an email header when you see those sort of terms you know spoofing right spyware this is a software that works in the background monitoring you tracking you your keylogger records all your keystrokes and then the general term computer virus malware remember it's malicious software that's why it's called malware looking to disrupt the normal functioning of a computer so they might also just ask you what are some of the signs that your computer might be infected with a virus and you know you'll say maybe it's slowing down maybe files have been disappearing things are not working as they should that type of thing computer worms just understand what it does what does this piece of software actually do can it work over the network or can it move itself over the network when your network's connected to the internet or not just understand those things trojans as well you've gone through this ransomware they can give you a scenario in ransomware to ask you well what type of malicious software what type of malware occurs when someone is you know basically lock the information away and they are demanding money for it they'll usually also ask you what type of currency would you use and most of the time it would be you know aimed at bitcoin okay as if bitcoin is just used for criminal purposes yeah right okay so um adwie i've dealt with this in previous modules as well bots please know this okay this is something that comes up often your computer's compromised and it's controlled remotely it has now become a bot and then we look at the different categories of computer crime things like cyber stalking spam all this falls into harassment cyber bullying okay go and check on netflix there are some beautiful documentary series very nicely done very entertaining dealing with a lot of this okay you get internet attacks as well attacks on businesses online this is why you have a new thing called cyber terrorism right it's not just terrorists out there but actually dealing with it in cyber space as well then you have people stealing bandwidth stealing wi-fi yeah you know when you like i keep saying you're sitting at the on the corner and you're taking someone else's wi-fi [Music] okay identity theft stealing processing time like you don't realize it but using the computer for something that's not school related you are stealing computer processing time you using that processing time to do something else playing games in class okay you are stealing right data and intellectual property and money so unfortunately and copyrighted material all of these things just bear that in mind how do we protect ourselves the main thing is an antivirus piece of software right main thing is antibiotic software they're going to mention a couple you should be able to mention a couple of examples but for most of the scenarios you'll be able to say antivirus software however you must update it regularly if you don't it's useless okay i'm just going to say it's straight it is absolutely useless so you need to update that you want to you know check when you install free software you want to make sure that you are checking um the little the icons over here to make sure there's a lock on there that you've got https which is the more secure protocol you want to have good password policies stay informed in the media about you know different tips and reports to keep yourself safe don't give out your personal info don't click on just any link that comes up in an email don't open attachments if you don't know where it's from um guys it you know it's actually very basic to stay safe but yeah most people just don't for them it's like too much work okay so access versus privacy we know at our schools we have password policies um and we have this so that we can't work on somebody else's data and work and actually claim that it's ours um and then i think this is the last one the paranoid abc where we when it comes to things like you know online and that we assume nothing we believe no one and we check everything that is how we keep ourselves safe online and i think that yeah that is basically it for the modules that we would have covered in term two great trials i will be doing a practical video but i think for you i'm gonna focus more on um you know old uh theory and practical questions to go with this but if there's anything else you need just let me know in the comments and i'll see what i can do to create some content thanks so much and i'll see you in the next video