{"id":2635,"date":"2018-01-12T14:16:20","date_gmt":"2018-01-12T14:16:20","guid":{"rendered":"https:\/\/old.staging-teachcomputerscienceuk.kinsta.cloud\/?p=296"},"modified":"2024-07-24T11:23:15","modified_gmt":"2024-07-24T11:23:15","slug":"cookies","status":"publish","type":"post","link":"https:\/\/teachcomputerscience.com\/cookies\/","title":{"rendered":"Cookies"},"content":{"rendered":"<div class=\"gb-container gb-container-4695ccc6 upsell-block\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-b27d701c\">\n<div class=\"gb-grid-column gb-grid-column-113cc956\"><div class=\"gb-container gb-container-113cc956\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-18cd2904 gb-headline-text\">KS3 Internet Technologies (14-16 years)<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>An editable PowerPoint lesson presentation<\/li><li>Editable revision handouts<\/li><li>A glossary which covers the key terminologies of the module<\/li><li>Topic mindmaps for visualising the key concepts<\/li><li>Printable flashcards to help students engage active recall and confidence-based repetition<\/li><li>A quiz with accompanying answer key to test knowledge and understanding of the module<\/li><\/ul>\n\n\n<div class=\"gb-button-wrapper gb-button-wrapper-19900672\">\n\n<a class=\"gb-button gb-button-e658e6bc gb-button-text\" href=\"https:\/\/teachcomputerscience.com\/ks3\/networking\/internet-technologies\/\">View KS3 Internet Technologies Resources<\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-fbf23a1a\"><div class=\"gb-container gb-container-fbf23a1a\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-6df7a4ac gb-headline-text\">A-Level Internet technologies (16-18 years)<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>An editable PowerPoint lesson presentation<\/li><li>Editable revision handouts<\/li><li>A glossary which covers the key terminologies of the module<\/li><li>Topic mindmaps for visualising the key concepts<\/li><li>Printable flashcards to help students engage active recall and confidence-based repetition<\/li><li>A quiz with accompanying answer key to test knowledge and understanding of the module<\/li><\/ul>\n\n\n<div class=\"gb-button-wrapper gb-button-wrapper-91bf512c\">\n\n<a class=\"gb-button gb-button-828a2062 gb-button-text\" href=\"https:\/\/teachcomputerscience.com\/a-level\/exchanging-data\/internet-technologies\/\">View A-Level Internet technologies Resources<\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n\n<h3 class=\"wp-block-heading\">What are Cookies?<\/h3>\n\n\n\n<p>Cookies are a small amount of text-only data saved on the computer while browsing a certain website. \u00a0Typically, they contain two pieces of information: \u00a0a site name and a unique user ID.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why are they called Cookies?<\/h3>\n\n\n\n<p>It was first called cookie by Lou Montulli. \u00a0He took it from the term magic cookie. \u00a0A magic cookie refers to bundles of data sent to and received from Unix computers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Are Cookies Programs or Viruses?<\/h3>\n\n\n\n<p>Cookies are just plain text files&nbsp;saved on the computer while browsing. &nbsp;Since they are plain text files, they cannot be&nbsp;run&nbsp;and cannot infect nor destroy other data on the computer. &nbsp;Therefore, cookies are not viruses and also not programs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How do Cookies Work?<\/h3>\n\n\n\n<p>When you browse a site for the first time, a cookie is saved onto your computer. &nbsp;On your next visit to the site, your computer checks to see if it has a relevant cookie or a cookie that has the site name. &nbsp;If it has a cookie present, it sends the information from that cookie back to the site.<\/p>\n\n\n\n<p>The site will then recognize that you have visited before and customized what shows up on screen taking into account your previous activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Advantages of Cookies<\/h3>\n\n\n\n<p>Some cookies are more advanced. \u00a0They can record your activities such as how much time you spent on each web page, the links you clicked, and even your choice of layout and colors. \u00a0Cookies can also be used to save data regarding your \u2018shopping cart\u2019 by adding items as you click.<\/p>\n\n\n\n<p>There are endless possibilities and generally cookies are beneficial. \u00a0It makes your interface with favorite sites smoother. \u00a0Without cookies, online shopping would not be this simple.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Disadvantages of Cookies<\/h3>\n\n\n\n<p>There is nothing strange about the information stored by cookies, but you may just not like the idea of your name being included in marketing lists, or your data being used to spot you for special offers.<\/p>\n\n\n\n<p>There was a controversy when cookies first started to appear. &nbsp;Some people viewed them as malicious since your computer was being used without warning to save personal information about you. &nbsp;Information that could then be used to draw information on your browsing activities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is a Tracking cookie?<\/h3>\n\n\n\n<p>A&nbsp;tracking cookie&nbsp;is used by online advertisers and marketing companies. &nbsp;It contains specific information about your computer and&nbsp;your browsing history. &nbsp;This is used by the company to display advertisements it thinks you&#8217;d be inclined to.<\/p>\n\n\n\n<p>A\u00a0third-party cookie is a type of tracking cookie added to a computer by a different website or company for which the cookie is utilized. For example, a website has a button for liking them on Facebook. \u00a0Clicking the Facebook Like button on the website adds a Facebook cookie to your computer. \u00a0Because the cookie for Facebook came from the website, the cookie is treated as a third-party tracking cookie.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is Cookie Stealing?<\/h3>\n\n\n\n<p>After logging into a site with your username and password, a cookie that has a specific\u00a0badge\u00a0is stored on your computer to identify you as a legitimate visitor to the server. \u00a0Cookie stealing\u00a0is a way of taking that cookie from your computer in order to access your account. <\/p>\n\n\n\n<p>Once your cookie has been taken, any computer with that cookie can open your account without login details as long as the cookie has not changed nor expired since it was taken.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the Cookie Law?<\/h3>\n\n\n\n<p>The\u00a0cookie law\u00a0is a law passed in the European Union. \u00a0It requires EU companies that employ cookies on their sites to inform visitors of the use of cookies and give them the option to decline receiving cookies.<\/p>\n\n\n\n<h3 class=\"gb-headline gb-headline-8c8d1597 gb-headline-text\">Further Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/HTTP_cookie\" target=\"_blank\" rel=\"noopener\">HTTP cookie<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What are Cookies? Cookies are a small amount of text-only data saved on the computer while browsing a certain website. \u00a0Typically, they contain two pieces of information: \u00a0a site name and a unique user ID. Why are they called Cookies? It was first called cookie by Lou Montulli. \u00a0He took it from the term magic &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Cookies\" class=\"read-more button\" href=\"https:\/\/teachcomputerscience.com\/cookies\/\" aria-label=\"More on Cookies\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_generate-full-width-content":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[30],"tags":[204,47],"class_list":["post-2635","post","type-post","status-publish","format-standard","hentry","category-internet","tag-article","tag-hide-old-upsell","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50"],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/2635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/comments?post=2635"}],"version-history":[{"count":1,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/2635\/revisions"}],"predecessor-version":[{"id":605422,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/2635\/revisions\/605422"}],"wp:attachment":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/media?parent=2635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/categories?post=2635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/tags?post=2635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}