Skip to content

The internet and its uses

5.1 The internet and the world wide web

Candidates should be able to:

  1. Understand the difference between the internet and the world wide web

Note and guidance

  • The internet is the infrastructure
  • The world wide web is the collection of websites and web pages accessed using the internet
  1. Understand what is meant by a uniform resource locator (URL)

Note and guidance

• A URL is a text-based address for a web page; it can contain the protocol, the domain name and the web page/file name

  1. Describe the purpose and operation of hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS)

  2. Explain the purpose and functions of a web browser

Note and guidance

• The main purpose of a web browser is to render hypertext markup language (HTML) and display web pages

  • Functions include:
    • storing bookmarks and favourites
    • recording user history
    • allowing use of multiple tabs
    • storing cookies
    • providing navigation tools
    • providing an address bar
  1. Describe how web pages are located, retrieved and displayed on a device when a user enters a URL

Note and guidance

• Including the role of: – the web browser - IP addresses - domain name server (DNS) - web server - HTML

  1. Explain what is meant by cookies and how they are used, including session cookies and persistent cookies

Note and guidance

  • Cookies are used for functions, including:
    • saving personal details
    • tracking user preferences
    • holding items in an online shopping cart
    • storing login details

5.2 Digital currency

Candidates should be able to:

  1. Understand the concept of a digital currency and how digital currencies are used

Note and guidance

  • A digital currency is one that only exists electronically
  1. Understand the process of blockchain and how it is used to track digital currency transactions

Note and guidance

  • Blockchain, in its basic form, is a digital ledger, that is a time-stamped series of records that cannot be altered

5.3 Cyber security

Candidates should be able to:

  1. Describe the processes involved in, and the aim of carrying out, a range of cyber security threats

Note and guidance

  • Including:
    • brute-force attack
    • data interception
    • distributed denial of service (DDoS) attack
    • hacking
    • malware (virus, worm, Trojan horse, spyware, adware, ransomware)
    • pharming
    • phishing
    • social engineering
  1. Explain how a range of solutions are used to help keep data safe from security threats

Note and guidance

  • Including:
    • access levels
    • anti-malware including anti-virus and anti-spyware
    • authentication (username and password, biometrics, two-step verification)
    • automating software updates
    • checking the spelling and tone of communications
    • checking the URL attached to a link
    • firewalls
    • privacy settings
    • proxy-servers
    • secure socket layer (SSL) security protocol