• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Strand Two ITGS Assignment - Standards and Protocols allow different rules and settings to work together with each other in different IT systems. They might control how hardware, software and information are understood in the IT environment.

Extracts from this document...

Introduction

Standards and Protocols Formal Definition: Standards and Protocols are technical rules and conventions that enable compatibility and therefore facilitate communications or interoperability between different IT systems and their components. They might govern the design and use of hardware, software and information. For example the communication protocols used on the internet, the ASCII representations for characters or the design of the printer port on a personal computer are all governed by standards. Informal Definition: Standards and Protocols allow different rules and settings to work together with each other in different IT systems. They might control how hardware, software and information are understood in the IT environment. For example, if you wanted to print something off the internet (picture), the computer follows certain protocols to send the information from the internet to the printer port, to be digitalized on paper. Video Clip: Before talking about the 5 articles, I found a video to help explain what and Internet Protocol is, since many of the articles have to do with Internet Protocol The second video goes a little more in depth about IP, and how it works Articles http://news.bbc.co.uk/2/hi/programmes/click_online/8941048.stm * Digital Nomads - are individuals who are able to live and work anywhere they please, using hotspots to be able to work. ...read more.

Middle

* These types of information don't have to be pictures that you saved on your storage device; E-Mail is a classic example of information that can be easily lost. In a real life example, there was a missing White House e-mail archive from the run-up to the Iraq War, which is a violation of the Presidential Records Act. * With the current state of the technology, data is vulnerable to both accidental and deliberate erasure, and what people want to see is an environment where we can make sure the data does not die due to accidents, malicious intent or even neglect. * However now, there have been movements among governments saying that companies should not sell software that uses proprietary file formats exclusively. They want these companies to provide an open format so that no one has to fear for the erasure of memorable, and important files This article relates to Standards and Protocols since individuals have been using Communication Protocols over the internet, or Protocols to put the data in storage devices, http://www.ispreview.co.uk/story/2010/09/25/uk-isps-warned-that-failed-ipv6-adoption-is-a-disaster-waiting-to-happen.html * This article is about the fact that the generation of Internet Protocol Version 4 (IPv4) will be running out very soon, as addresses rapidly deplete, and that organizations should adopt the newer IPv6 version * The reason that the IPv4 is running out is mainly due to ...read more.

Conclusion

order for him to make income This article has to do with our topic since Pena hacked into Voice over Internet Protocol networks in order to make money, which is obviously against the law. http://articles.economictimes.indiatimes.com/2012-01-24/news/30659355_1_hackers-polycom-videoconferencing-systems * This article is about how internet protocol videoconferencing through Skype can be hacked into * Last month, a hacker was able to hack into Skype video calls, and was able to eavesdrop on privileged attorney-client conversations and read trade secrets on a report lying on the conference room table * Sort of like the previous article, the unknown hacker was able to hack into the IP address of the video conference, and was able to listen in to confidential information * Nothing has been revealed to why the hacker has done it, and none of the information in the video conferences have been leaked over the web, or in any other form * However, this is quite frightening since it now opens up the possibilities that hackers have the ability to hack into any video call, and have the ability to steer the camera around with just a move of a mouse. This relates back to the topic since the hacker was able to interfere with the IP address, and alter the instructions so that the hacker was able to control the camera in the Skype call ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Information Age

    3 star(s)

    * The video might not have fulfilled the law of legislation. * Sources: Question 4: Are the examples seen seem to be fit for purpose? (i.e. They meet the needs of clients and customers?) Source Information Yes the customers are wanting you tube site to be slightly privatised, as issues with harassment videos seemed to heard.

  2. Marked by a teacher

    Application Software

    The following example shows how text-based of FTP may be used to download a copy of Mozilla browser. 1. Type ftp in the command prompt and press return to start the software. 2. Type open.ftp.mozilla.org to connect to the remote server.

  1. Unit 5 - Communications Technology

    After looking at the case of which one is better, Switch or HUB, I would recommend Switch device over HUB device and reason for that is clearly explained in above paragraphs. http://www.erg.abdn.ac.uk/users/gorry/course/equip-pages/lan-example-equip.html Repeaters Repeaters are rather like two-port hubs. They have just two RJ45 sockets and are mainly used as a way of extending cable lengths.

  2. Energy Conversion (EC) Systems

    Anthracite: Coal with a heating value of 15,000 Btu. Bituminous Coal: Coal with a heating value of 10,500 to 15,500 Btu per pound and carbon content of 45% to 86%; located across the U.S.; see Coal rank. Btu (British Thermal Unit): The amount of heat needed to raise the temperature

  1. Database Analysis & Design

    When multiple instances of the same information occur in a table there is a possibility that this information will not be consistent throughout when the tables are update and changes, this then leads to loss of data and problems. When tables are normalised it is less vulnerable and less at

  2. This assignment consists of having an interview with Mrs.Atwell and asking her all the ...

    Mrs.Atwell prioritises her jobs from most too least important. There is a yearly scheduled planner, which Mrs.Atwell records the starting of Work Experience and when she has to set and choose Work Experience for other year student such as year 10 and then 6th form.

  1. Explain the function of computer hardware components

    be retrieved very quickly, which reduces the need for the processor to wait for responses from the main memory. It?s used to speed up the computer and is between the main memory and the CPU. Hard drive A hard drive is the main storage media device that permanently stores all data onto the computer.

  2. AO3 Investigate how search engines work

    Sites like fact-monster also use this method. Though some don't trust this software as sometimes something inappropriate might still pop up very occasionally. As these are not pre screened by humans. How search engines work Registering your website Web crawlers- The best way to register a site on most web crawler based websites is to link your website on another page.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work