• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Topic 2 Exchanging Information - forms of communication with their advantages and disadvantages.

Extracts from this document...


Transfer-Encoding: chunked ´╗┐Topic 2 Exchanging Information Worksheet Starting Point: Communication methods (25 minutes) Use your textbook or the resources on Student Portal or the Internet to help you research these topics. The first one has been done for you so you can see the level of detail expected. http://www.enkivillage.com/advantages-and-disadvantages-of-mobile-phones.html https://www.google.co.uk/search?q=teact+ict+advnat%5Cges+of+mobile+phones&sourceid=ie7&rls=com.microsoft:en-GB:IE-Address&ie=&oe=&surl=1&safe=active&gws_rd=ssl Method Of communication What is it? Benefits/advantages Drawbacks/disadvantages Mobile phones Hand-help device for making calls, texting, listen to music, surf web, email * Portable so the communication is easy * Can be contacted anytime / You are always connected * There are multiply uses * Security ? children feel safer as they can easily contact their parents * In emergency situations , help can be reached * You can call people anywhere on the planet * No specialist equipment is needed. * Cause accidents as they are a distraction for example driving * Disturb other people * Might be inference so the quality of the call can be poor. * You can?t see body language so a lot of non verbal communication is lost * Its hard to make a record of what?s being said , things may get forgotten or misinterpreted SMS (texting) Texts are sent from one mobile phone to another. It is a quick and convenient way of sending a short message to someone .Sending messages, images, videos and sound clips between devices. ...read more.


File sharing Any electronic document can be placed on a webpage for all to see. * Co-workers can easily have access to files * No size limit of file that can be transferred * Easy to share share music and videos * You have to decide in advance how you intend on naming the files * Someone could save an older version over a new version * Everyone involved in the project must use the same naming convention * Transferring long files can take a long time . E-mail A way of exchanging messages electronically * Messages are written, stored and sent to recipient so sender and recipient do not have to be online at the same time. * Documents, videos , sound , pictures can all be sent and can be very large * Cheap * Less time consuming than writing a letter . * Can cause miscommunication and the recipient can not hear your tone. * You need internet * 2/3 of mail sent are spam * people can waste time at work by sending emails to friends * you may have to wait long for a reply * email attachments can contain viruses * there are lots of scams , its easily to fall for one Video conferencing Used to connect 2 or more people over network/internet so that they can see and hear each other . ...read more.


There?s always danger of someone saving an old version over a new version. * Secure transfer of data (threat from hackers) Encryption codes files before sending over the internet. If they are intercepted by hackers , the data cannot be understood. * Secure access to data (userids, passwords, firewalls, encryption, read/write permissions). Username ? used to allocate programs , settings , storage area and files . Password- used to ensure the person who is using the network is genuine. How can we stay safe while using these methods of communication (and avoid breaking the law!)? * Showing respect to others . Do not be impolite and use appropriate language . * Complying with Data Protection regulations . The data protection act was passed by parliament to control the way information is handled and to give legal rights to people who ace information stored about them . * Using appropriate language. Do not swear. Do not use racially offensive words. Do not use words that will offend certain groups of people. Ensure that everything you write is appropriate to all ages. Do not cyberbully. * Disclosure of personal information . Do not give out any personal information about you or pictures * Misuse of images. Images can be altered to tell lies . You cannot tell if images are genuine. A picture can be passed on with your permission . Your image could end up on a website which paedophiles use. You can be identified from your image and then stalked. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work