Please enable JavaScript.
Coggle requires JavaScript to display documents.
revision after christmas - Coggle Diagram
revision after christmas
if you log into a new website read the terms and conditions before you click accept all. if it is too long look for a summarized version on whatever browser you use e.g. safari, google etc.
-
NEVER tell ANYONE your password , not even a friend or a loved one.
if you are planning on adding your friend (who you know in real life ) as a friend on a game , ask them a question only they would know the answer to or in real life tell them to say a certain word like cookie or pie etc.
a good , secure password should include: capital letters; lowercase letters; special characters; not a real word; at least 6 to 8 characters long; could be the first letter of every word in a phrase that you will remember.
-
-
never become friends with people via the internet , they might not be who they seem , they could be pretending to be someone else
never write your password down somewhere someone can find it , hide it somewhere only you would think to look
don't trust strangers you meet online , they could be a hacker
-
if you have an app that you are too young for , ask your parents for parental controls, private accounts and private posts
-
Data is broken into packets because they are too big as a whole, this makes travelling through the network easier. After, the senders and the receiver's IP address is added so it doesn’t get lost. This also helps the routers direct them to their destination. A network is fault tolerant because there are many paths a packet can follow, this means they do not have a set route to take incase something goes wrong.
if you are under 13 , when you want to follow someone or like/comment on a strangers post ask your parents for consent
never use the 'show password' feature when other people are looking at your screen they will see your username as well so they have all the info they need to log in as you
ENCRYPTION
Encryption is a secret code that uses public and private keys to scramble up messages. This is also used on WhatsApp to make messages End-to-End encrypted. The receiver must have a key to decrypt the message. A back door is a way to read an encrypted message by bypassing the encryption.
binary is a base 2 number system that uses 2 stages-on(1) and off(0). binary uses 1's and 0's to represent messages and even numbers that computers can understand
there are 2 types of data compression- lossy-removes data permanently to reduce file size. it is irreversible and lossless-reversible and keeps data
there are 4 elements of computational thinking: abstraction, algorithm, pattern recognition and decomposition
-