Thursday, 22 November 2012

P3 unit 1


P3 unit 1

Wi-Fi: Wi-
Fi plays a big part in people’s life; it allows you to connect to the internet wirelessly! Letting you access anything online. Wi-Fi is used in laptops, phones and iPods however you need Wi-Fi hot spots because the Wi-Fi only ranges from 32m-95m.

Sms: shot messaging service, connects the world together, designed for phones, the protocol allows you to send messages from anywhere of a small few using landline devises.

Wap/3g:  WAP is a device for information for mobiles wireless networks. WAP has browsers for mobiles that use the protocol.


Bluetooth: Blue tooth has two classes.  Depending on the class the range is different.  Class 1: range up to 100 metres. Class 2: range up to 30 metres.  The range depends on the transmitter and the phone receiving the files. The bigger the range, the slower the transmission speed. The closer you are to the Bluetooth transmitter the faster it will send files.  Most phones have a Bluetooth device. Bluetooth can send all files such as photos, documents and music files.  Bluetooth comes as an installed device on most phones.

Gps: GPS is a satellite device used for positioning.  It is a space-based satellite navigation system that provides location and time information in all weather, anywhere on or near the Earth.  GPS is used on sat-navs Tom-Toms

Things like backing up your data using a hard drive then when your computer crashes you will have all your work, also get a fire wall which makes sure you don’t get any viruses  and getting a password and a security company to make sure no one can hack or steal your computer. Mobiles use encryption to keep data safe. Encryption is The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.

1 comment: