ICT 0417 COMMUNICATION NOTES
ICT 0417 COMMUNICATION NOTES
What is email?
• Email is a method of exchanging messages and files over the internet
• The main uses of email are:
o Personal communication
o Professional correspondence
o Marketing
• Companies provide guidelines about acceptable use of emails
• Guidelines about emails from a company include:
o Purpose of the email
o Using acceptable language
o Email security, including anti-virus software
Netiquette
• Netiquette (Internet etiquette) is the need to respect others online
• It is an agreement to respect the opinion of others in online forums, internet
messages and emails
• Some common examples to remember are:
o Most posts are public and can potentially be read by anyone
o A clear, inoffensive and succinct language will be used
o Give a good impression of yourself, considering, the tone of writing,
spelling, punctuation and grammar
Sending Emails
Email Groups
• Email groups allow for mass communication with a defined set of recipients
• It is easier to send out multiple emails if the addresses are grouped together
• The benefit of doing this is that it ensures no one misses out on an
email containing key information
• A drawback of email groups is that spammers can utilise them to target a large
group of people with ease
Email Operations
• There are three key email operations to be aware of:
o Carbon Copy (CC) - this is used when you want to include additional
recipients to view the email
o Blind Carbon Copy (BCC) - this is used when you want additional
recipients to view the email without other recipients knowing
o Forward - This allows you to send an existing email to a new recipient
o Attachments - These allow files to be sent along with the email message
Spam
What is spam?
• Spam is unwanted/unsolicited junk mail which is sent in large numbers to
inboxes
• Spam fills the users' inboxes, often with advertising content or
for phishing/spreading malware
• Phishing emails will be used to act as a reputable company or organisation in
the aim of getting your personal details such as usernames and passwords
How can spam emails be detected?
• Spam emails often has multiple spelling or grammatical errors
• They often use broken English, though this is now improving with the use of AI
• Spam emails will not address you by name
• Often spam emails will ask you to enter your details by clicking a link
o Reputable companies have now stopped doing this to make identifying
spam a lot easier
Worked Example
Describe the ways that a user can recognise spam and methods to help prevent it. [6]
Give a maximum of 4 bullet points on how users can recognise spam content and then
a maximum of 4 points on how they can prevent spam content.
Answers:
The internet has many features to it which users can use to communicate and share
information with others
What is a blog?
Web logs (blogs) are journals shared on the internet by a writer (blogger)
They are regularly updated and often written in an informal or conversational style like a
journal, managed by individuals or small groups
People can share their views and opinions on a variety of topics including
Movies
Other internet users can’t change the content of the blogs, they can only read them
What is a forum?
A forum is an online discussion site where people can hold conversations in the form of
posted messages
They are often organised around specific topics or interests, and divided into categories
known as threads
A moderated forum is under the control of an administrator who determines what can and
can’t be posted, preventing inappropriate or hurtful content from being published
An unmoderated forum means that no one is in charge and the moderation of the forum
relies upon voluntary action between the users of the site
What is a wiki?
A wiki is a website or web application that allows users to add or edit content
Social Networks
A social network website is a platform where users can connect with others and share
content
TikTok
X (Twitter)
Instagram
Social networking platforms usually require users to create a profile and allow them to
share text, images, videos, and links
Privacy settings allow users to control who can see their content
An Internet Service Providers (ISP) is a company that provides access to the Internet to
users and businesses
The ISP provides internet access by leasing equipment and telecommunication lines to
users that are required to access the internet
Web browsers
A web browser is a software application used to locate, retrieve, and display content on the
WWW
Web browsers are used to display web pages which include images, videos and other files
A hyperlink is a word/phrase/image which references data that the reader can follow by
clicking or tapping, usually taking you to another web page
Most web browsers have the following features:
Home page
Uniform Resource Locators (URLs) are the web address a user types into a web browser
Websites are stored in the form of an IP address however, these are not user friendly
An example is www.savemyexams.com
Search engines are tools that locate and display web pages related to the search terms
entered by the user
They are essential for navigating the vast amount of information on the internet
They index millions of web pages and use algorithms to rank the relevance of each page to
the search terms
Crawling
Indexing
Ranking
Crawling is when web crawlers scour the internet daily to retrieve new websites
Indexing is how websites are categorised based on the content of their web pages,
keywords and metadata
Ranking is how websites are ranked and listed on search engine pages – this depends on
many factors to display the most relevant results
Amount of information
Using quotation marks for exact phrases, plus signs for mandatory terms, or minus signs
for excluding terms can help refine the search
Finding relevant and reliable information
The internet offers a wealth of information, but not all of it is accurate or reliable
Assess the reliability of information by considering the reputation and credibility of the
source
Consider whether the information is biased, looking for perspectives that may be
promoting a particular viewpoint
Check how up-to-date the information is, as outdated information can be misleading
Data restriction: Parental, educational, and ISP controls could limit access to certain
information or websites
More control would prevent younger users and vulnerable groups from being exposed to
undesirable content
Protocols
What is a protocol?
FTP
SMTP
Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for
website viewing
HTTP allows clients to receive data from the sever (fetching a webpage) and send data to
the server (submitting a form, uploading a file)
HTTPS works in the same way as HTTP but with an added layer of security. All data sent and
received using HTTPS is encrypted
http
FTP
What is FTP?
File Transfer Protocol (FTP) allows sending and receiving files between computers
Uploading and downloading files to/from a web server is often completed using FTP
FTP offers greater efficiency and support for bulk transfers and large files such as resuming
interrupted transfers
FTP clients are software applications that use the FTP protocol to make the process easier
for users
ftp
TLS is a successor to SSL and is also a security protocol used to provide secure
communication over the internet
They both use a combination of symmetric and asymmetric encryption to secure data and
ensure data integrity
This contains the public key which can be used for authentication
Online banking
Online shopping
Messaging
Intranets/extranets
Worked Example
Identify three protocols and for each one, identify a use. [6]
Answers
Matched pairs:
SSL/TLS
Determines variables of the encryption for both the link and the data being transmitted [1]