Vous êtes sur la page 1sur 19

UNIT

207:
USING
THE
INTERNE
Assignment Title:
ABC IT Security (B) Sdn
Bhd
Name: Muhammad Danial Bin
Kamsur
Class: BTEC2
1 | P a g e

Task 1
Create a booklet to be distributed to the
clients that includes the following:

(a) Identify different types of connection methods
that can be used to access the internet (1.1)
Type of connection methods:-
*Wireless
Choose this if you have a wireless router or
network, even if you also have a broadband
connection. Also choose this if you're connecting to
a hotspot.

*Broadband (PPPoE)
Choose this if your computer is connected directly
to a broadband modem (also called a Digital
Subscriber Line (DSL) or cable modem), and you
have a Point-to-Point Protocol over Ethernet
(PPPoE) Internet account. With this type of account,
2 | P a g e

you need to provide a user name and password to
connect.

*Dial-up
Choose this if you have a modem but it's not a DSL
or cable modem, or if you want to use Integrated
Services Digital Network (ISDN) to connect your
computer to the Internet.

(b) Identify the benefits and drawbacks of the
connection method used (1.2)

Benefits connection method:-

*Wireless
Wireless networks provide an inexpensive and easy
way to share a single Internet connection among
several computers.

*Broadband
Broadband internet offers unlimited access and
you won't be charged based on the connection
duration.

*Dial-up
3 | P a g e

A dial-up connection is much safer than any other
technology because of the rotation of the IP
addresses, assigned to a user.

Drawbacks connection method:-

*Wireless
The network can be less stable. Wireless reception
may be impaired by a number of factors including
large distances or objects between wireless devices,
and other wireless networks.

*Broadband
Higher security risk than dialup connection, a
personal firewall is needed to protect your
computer.

*Dial-up
It Requires a Phone Line, when you're online with
a dial-up connection, you cannot use your phone.
If someone calls, you may disconnected from the
Internet and lose whatever work you may have
been doing at the time. This also limits your
Internet use from your home.
(c) Describe the threats to system performance
when working online (5.1)

Threats to System Performance
4 | P a g e

There are different types of threats that you can get
such as:
Viruses - from different websites or emails.

Adware - is advertisements and can be in a
form of pop-ups.

Malware - short for malicious software it
gather information that leads to loss of privacy.


(d) Describe the threats to information security
when working online (5.3)
Threats to Information Security
Types of Information Security:
Trojans - disguise themselves as legitimate files
and software you get them by downloading files
from unknown emails and off of un-trusted
web pages.

Worm - they can get in your system they tend
to destroy and corrupt files.
5 | P a g e


Spam - anonymous, mass undesirable mail
correspondence.

(e) Describe the threats to user safety when
working online (5.5)
Threats to User Safety
Types of User Safety:
Hacker - that will hacker your computer
systems to get your personal information.

Spyware - can also steal your personal
information.

Phishing - is a mail delivery whose aim is to
get from the user confidential financial
information as a rule.


(f) Describe how to minimise internet security
risks (5.6)
6 | P a g e

Have a firewall.
Don't download anything from other then
trusted sources.
Keep your programs updated.
Run your antivirus.
Dont uses Internet Explorer try to use Google
Chrome.


7 | P a g e

Task 2
During the process of collecting
information and creating the booklet,
demonstrate the following:
(a) Get online with an internet connection (1.3)







*This is how to Get online with an internet.
(b) Use helps facilities to solve internet connection
problems (1.4)
If I am having problems connecting to the internet I
can open the network diagnostics on the computer
control panel.




8 | P a g e















*Then you click the Network Adapter.












Click on Troubleshoot
problems Diagnose and
repair network problem
9 | P a g e


*After you click Network Adapter then you click Next.











*The troubleshooting detects that I have several network
adapters and asks me to select the one I want to
troubleshoot. In this case, I selected All network adapters
and pressed Next.









10 | P a g e



*Then troubleshooting starts the diagnostics process and
displays a progress bar. When it detects problems, it also
tries to apply the fixes it believes are appropriate and then
verifies if the problem still exists.











*After the whole process are successes, the troubleshooting
shares details about the problem and its status.

(c) Select and use browser tools to navigate web
pages (2.1)



(Home)
Opens or
returns to
starting page
(Location
bar) You
can type in
a sites
address
Page
Bookmark
11 | P a g e









(d) Identify when to change settings to aid
navigation (2.2)

















(Back &
Forward)
Takes you to the
previous page
(Reload)
Refresh
current page
Options
12 | P a g e






*This is how you setting to identify and change your
navigation address bar.
(e) Adjust browser settings to optimise performance
and meet needs (2.3)

















13 | P a g e






*This setting is you can change the font size, adjust the
page at Web content and also you can clear the browsing
data at Privacy.
(f) Identify ways to improve the performance of a
browser (2.4)
In order to improve the performance of a browser
we have to:-
Close out other computer programs when you
are running the Internet. Other programs are
going to take up RAM, and if too many
programs are running at the same time you
will experience slower performance.

Remove excess programs from your computer. If
your computer is down to its last few megabytes
of hard drive space, everything is going to run
slower, including the Internet browser. Open
the "Control Panel" and select "Add or Remove
14 | P a g e

Programs." Scroll through this list and remove
all programs you no longer use.

Launch your Internet browser and clean out
all of the old history, cookies and cache files.
After a while these items can begin to bog
down a Web browser and significantly slow it
down. If this is the case for you select the
"Tools" option and clear out the saved private
data. You should perform this task every few
weeks to speed up the Internet browser.





(g) Select and use appropriate search techniques to
locate information efficiently (3.1)







15 | P a g e







*There are many type search engines that you can put at
your homepage and you can choose anything to put at
your search engines.







(h) Describe how well information meets
requirements (3.2)
To find the information meet its requirement we
must find a suitable answer for it and not just copy
and paste to your any document. Although, we
16 | P a g e

must careful that thinking the information might
be hard rather than finding on the internet.
Appropriate information must be concluded in
some various requirements, some of the information
on the web can be easily search on internet and
sometime we use our own words. In addition, we
must put our accuracy to high spectate so that we
can do our work and thinking the information so
easily.
Finally, before we paste the information in the
requirements we must first verify that the answer is
correct and check that all spelling and grammar is
correct then you can paste the information and
also with suitable images that already found on
the internet.






17 | P a g e



(i) Manage and use references to make it easier to
find information another time (3.3)










*This is how you save your Bookmark.










18 | P a g e


*This is where you can check you Bookmark Page.

(j) Download, organize and store different types of
information from the internet (3.4)











*This is the different type of data information that I
download and organize.

Vous aimerez peut-être aussi