The internet and its uses
5.1 The internet and the world wide web
Candidates should be able to:
- Understand the difference between the internet and the world wide web
Note and guidance
- The internet is the infrastructure
- The world wide web is the collection of websites and web pages accessed using the internet
- Understand what is meant by a uniform resource locator (URL)
Note and guidance
• A URL is a text-based address for a web page; it can contain the protocol, the domain name and the web page/file name
Describe the purpose and operation of hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS)
Explain the purpose and functions of a web browser
Note and guidance
• The main purpose of a web browser is to render hypertext markup language (HTML) and display web pages
- Functions include:
- storing bookmarks and favourites
- recording user history
- allowing use of multiple tabs
- storing cookies
- providing navigation tools
- providing an address bar
- Describe how web pages are located, retrieved and displayed on a device when a user enters a URL
Note and guidance
• Including the role of: – the web browser - IP addresses - domain name server (DNS) - web server - HTML
- Explain what is meant by cookies and how they are used, including session cookies and persistent cookies
Note and guidance
- Cookies are used for functions, including:
- saving personal details
- tracking user preferences
- holding items in an online shopping cart
- storing login details
5.2 Digital currency
Candidates should be able to:
- Understand the concept of a digital currency and how digital currencies are used
Note and guidance
- A digital currency is one that only exists electronically
- Understand the process of blockchain and how it is used to track digital currency transactions
Note and guidance
- Blockchain, in its basic form, is a digital ledger, that is a time-stamped series of records that cannot be altered
5.3 Cyber security
Candidates should be able to:
- Describe the processes involved in, and the aim of carrying out, a range of cyber security threats
Note and guidance
- Including:
- brute-force attack
- data interception
- distributed denial of service (DDoS) attack
- hacking
- malware (virus, worm, Trojan horse, spyware, adware, ransomware)
- pharming
- phishing
- social engineering
- Explain how a range of solutions are used to help keep data safe from security threats
Note and guidance
- Including:
- access levels
- anti-malware including anti-virus and anti-spyware
- authentication (username and password, biometrics, two-step verification)
- automating software updates
- checking the spelling and tone of communications
- checking the URL attached to a link
- firewalls
- privacy settings
- proxy-servers
- secure socket layer (SSL) security protocol