KEMBAR78
Sme RN Ict P1 | PDF | Graphical User Interfaces | Operating System
0% found this document useful (0 votes)
19 views85 pages

Sme RN Ict P1

The document provides an overview of various digital devices including computers, laptops, mobile phones, tablets, and multifunctional devices, detailing their definitions, features, advantages, and disadvantages. It explains the types of input and output devices, as well as user interfaces such as CLI and GUI. Additionally, it discusses the concept of convergence in technology, highlighting how devices have merged functionalities over time.

Uploaded by

ta980893
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views85 pages

Sme RN Ict P1

The document provides an overview of various digital devices including computers, laptops, mobile phones, tablets, and multifunctional devices, detailing their definitions, features, advantages, and disadvantages. It explains the types of input and output devices, as well as user interfaces such as CLI and GUI. Additionally, it discusses the concept of convergence in technology, highlighting how devices have merged functionalities over time.

Uploaded by

ta980893
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 85

05/05/2025 SME REVISION NOTES

ICT P1

Rahul Pada Dey Sarkar


STEMAYS
Ch-1 Digital Device
Types of Digital Devices
What is a computer?
• A computer is an electronic device capable of taking an input, processing data, storing
information and providing an output
• Data that is input, is raw, unprocessed information
• Information is data that people understand

Mainframe computers & microprocessors


What is a mainframe computer?
• A mainframe computer is a computer with huge processing power and data storage capabilities
• Built to handle enormous amounts of data and carry out complex calculations
• Designed to be secure, reliable and support large volumes of simultaneous users
• Carry out critical tasks for large organisations in sectors such as:
o Finance
o Health
o Government etc.

What is a microprocessor?
• A microprocessor is an integrated circuit (IC) that contains a central processing unit (CPU)
• A microprocessor is embedded into devices to help them carry out tasks
• The microprocessor is responsible for executing instructions
• Microprocessors are used in a home to monitor and control devices such as:
o Central heating systems
o Security alarm systems
o Home entertainment system etc.

Laptops & desktop computers


What is a desktop computer?
• A desktop computer is a computer designed to stay in one place, for example on a desk
• A desktop computer traditionally consists of a separate:
o Monitor
o Computer
o Keyboard & mouse
• Desktop computers are typically more powerful than mobile computers
• Desktop computers are upgradable, the parts can be replaced/changed to increase performance

Uses of desktop computers


Office & Business Education Gaming & entertainment
Word processing Online learning Online gaming
Financial modelling Research (www) Streaming music/film/TV
1
Email Content creation Social media
Data storage & backup Multimedia presentations Online browsing
Video/image editing Online collaboration
Project management Online communication
Video conferencing
What is a laptop computer?
• A laptop computer is a computer designed to be portable
• A laptop computer traditionally consists of built-in:
o Monitor
o Computer
o Keyboard & trackpad or touch screen keyboard & pointer
• Laptop computers are typically less powerful than desktop computers due to:
o Power constraints due to size
o Focus on extending battery life
• Laptop computers are not easily upgradable, components are integrated for size and efficiency
• Laptop computers are battery powered
• Some laptops are used as desktop replacements

Advantages and disadvantages


Advantages Disadvantages
Easy to carry and use on the go
Limited expandability (Difficult to upgrade hardware)
(Portability)
Access to internet and resources from Less powerful (Lower performance compared to desktop
anywhere (Flexibility) computers)
Can be used for various tasks and
Shorter battery life (Needs frequent charging)
activities (Multi-functionality)
Mobile phones & tablet devices
What is a mobile phone?
• A mobile phone is an ultra portable electronic device designed to be lightweight and fit in a
pocket or small bag
• Mobile phones are used to transmit information between people and devices using radio waves
• Two examples of mobile phones are:
o Smartphones
o Specialist

Smartphones
• A smartphone is a versatile general purpose device
• Smartphones use subscriber identity module (SIM) cards to link the devices to a network carrier,
allowing them to make phone calls and send messages
• Smartphones include features such as:

Feature Description
• Quick communication
• Messages are stored on the device and can be read at any time
SMS messaging
• Use virtual keyboards and predictive text

• Simple voice communication


Phone calls • Requires cellular reception

Voice over internet protocol • Audio & visual communication via the internet
(VoIP) • Requires extra apps installed on the devices

2
• Can make & receive calls via smartphone, tablet and computers
• Requires a forward facing camera for video calls

• Requires cellular reception to access on the move


• Web pages are optimised for smartphone access
Accessing the internet
• Automatically used Wi-Fi when in range and connected

• Uses NFC
Mobile payments
• Smartphones have built-in cameras for video calls
Camera • Camera can act as a barcode scanner for QR codes

Specialist
• A specialist phone is designed for a particular groups of users or environment
• They prioritise specific features over general purpose use

Example Specialist features


• Larger buttons
• Easy to read displays
• Simplified user interface
Senior phones
• Emergency alert buttons
• Hearing aid compatibility

• Brightly coloured
• Robust
• Child friendly interface
Children's phones
• Limited app access
• Parental controls

• Designed for tough environments


• Thick screens
• Rugged outer casing
• Built to withstand:
Rugged phones o Water submersion
o Dust
o Extreme temperatures
o Drops

What is a tablet device?


• A tablet is a general purpose device that sits between a laptop and a smartphone
• A quick comparison shows:

Feature Smartphone Tablet


Portable but the larger screen means they
Size Ultra portable, designed to fit in a pocket
require a bag or case to carry around
Communication (calls, texts, mobile
Entertainment & productivity (games, reading,
Focus data), camera for capturing images &
watching movies)
videos
Carry out everyday tasks but may lack Typically more powerful than a smartphone but
Power &
power for demanding applications or not as powerful as a laptop, more processing
performance
tasks power & RAM.

3
Due to battery size they usually require Typically longer battery life depending on
Battery life
charging more often than a tablet usage

Other digital devices


Device Description Features
• Lens - High quality lens allows light to pass
Uses light sensors to capture through without defects
Cameras &
images formed by light • Image processor - Compensates for poor lighting
camcorders
passing through a lens • Sensors - Capture detail, more pixels are produced

• Powerful processors & graphics for high quality


smooth gameplay
Specialised PC for playing
Games console • Online capability
video games
• Controllers for interactivity

• Connects TVs, speakers and media players together


Home • Receiver processes audio and video signals
Hub for connecting audio and
entertainment • Can provide immersive experience (surround
video devices
systems sound)

• Connects to TVs or speakers for playback


A device for multimedia • Plays different media such as Blu-ray, DVD
Media players
playback • Portable media players for on the go

Multifunctional devices
What is a multifunctional device?
• A multifunctional device is a device designed to carry out a wide range of tasks
• Multifunctional devices combine functions that would usually be separate
• Examples of multifunctional devices include:
o Smartphones - Communication, photography, gaming, media playback/streaming, web
browsing all in one device
o Printers - Printing, copying and scanning in one device
o Smart TVs - Watch TV, connect to the internet, stream content

What is convergence?
• Convergence is the merging of technologies that would usually be separate
• Convergence led to the rise of smartphones

Worked Example
A. Which one of these could be used as a desktop replacement computer?

Laptop
Mainframe
Media Player
Server
[1]

B. Describe how tablet computers allow people to work from home.

[2]
4
Answers

A. Laptop [1]

B. A description to include two linked points from:

• Portability
• Internet connectivity
• Cloud storage
• Hosted applications
• Collaboration

Example

• Workers can connect to the Internet [1] to access cloud storage [1]

Features of Digital Devices


What are the features of digital devices?
• The most common features of a digital device are:
o Portability
o Performance
o Storage
o User interface
o Connectivity
o Media support
o Energy consumption
o Expansion capability
o Security features

Feature Description
Portability How easy is the device to carry around
Performance Processing power/memory (RAM)
Storage How much data can the device hold
Connectivity How can the device connect to other devices
Media support What media formats can the device play
Energy consumption How much energy does the device consume
Expansion capability Can more storage, memory or other features be added
What security features does the device have to help protect device and user
Security features
data
What is a user interface?
• A user interface is how the user interacts with the operating system
• Examples of user interfaces include:
o Command Line Interface (CLI)
o Graphical User Interface (GUI)
o Menu
o Natural language (NLI)

5
What is a command line interface?
• A Command Line Interface (CLI) requires users to interact with the operating system using text
based commands
• CLIs are more commonly used by advanced users
• Examples of CLIs are MSDOS (Microsoft Disk Operating System) and Raspbian (for Raspberry Pi)

What is a graphical user interface?


• A Graphical User Interface (GUI) requires users to interact with the operating system using visual
elements such as windows, icons, menus & pointers (WIMP)
• GUIs are optimised for mouse and touch gesture input
• Examples of GUIs are Windows, Android and MAC OS

What is a menu interface?


• A menu interface is successive menus presented to a user with a single option at each stage
• Often performed with buttons or a keypad
• Examples include
o Chip and pin machines
o Vending machines
o Entertainment streaming services

What is a natural language interface?


• A natural language interface (NLI) uses the spoken word to respond to spoken or textual inputs
from a user
• Examples include
o Virtual assistants - Amazon Alexa, Google Assistant, Siri
o Search engines
o Smart home devices

Digital device comparison


Feature Desktop Laptop Smartphone
Portability ⭐ ⭐⭐⭐ ⭐⭐⭐⭐⭐
Performance ⭐⭐⭐⭐⭐ ⭐⭐⭐ ⭐
Storage ⭐⭐⭐⭐⭐ ⭐⭐⭐ ⭐
Media support ⭐⭐⭐⭐⭐ ⭐⭐⭐ ⭐⭐⭐
Energy consumption ⭐⭐⭐⭐⭐ ⭐⭐⭐ ⭐
Expansion capability ⭐⭐⭐⭐⭐ ⭐⭐⭐ ⭐
Security features ⭐⭐⭐ ⭐⭐⭐ ⭐
Keyboard & touchpad
User interface Keyboard & mouse (touchscreen on some Touchscreen
laptops)

6
Most common ports
Multiple, wide variety of Wireless (Wi-
Connectivity available but fewer
ports (USB, HDMI etc.) Fi/Bluetooth)
number

Input & Output Devices


Input devices
What is an input device?
• Input devices are hardware components that allow users to interact with a computer system
• They enable the user to input data or commands into the system, which the computer then
processes to produce an output

Types of input devices


Input device Use Advantages Disadvantages
• Repetitive
strain injury
• Easy method of
• Slow to enter
entering data
Keyboard Entering data into a computer data compared
• Very common
to direct data
entry

• RSI (strain on
wrist)
• Intuitive and precise • Requires flat
control surface
Mouse To select on screen objects • Fast to make on- • People with
screen choices disabilities can
find them
difficult to use

• Enhances • Expensive
gameplay/simulation • Limited use
Moves sprites/characters around a experience outside of
Joystick
game • Improve realism gaming and
• Accurate simulators

• Precise • Cost
• Natural feel • Learning curve
Graphics tablet Use a stylus to draw or write
• Ergonomic • Battery life

• Accurate reproduction • Quality


• Easy to share and depends on
store resolution
Scanner Convert paper documents to electronic • Combined with • High quality
barcodes becomes a means can be
DDE slow

• Vast amounts can be


• Storage
Digital camera Taking photos/videos captured
compression
• No developing

7
• Easy to share can lead to a
loss in quality

• Real-time
• Image quality
communication
• Privacy
Webcam Streaming images/video • Cheap
concerns
• Multipurpose

• Hands-free input • Variable quality


• Can be used for voice • Verbal inputs
Microphone Input speech, sensor to pick up sounds recognition can be
• Fast inaccurate

Pressure causes layers to 'touch' • Screens can get


Resistive
• Intuitive dirty
touchscreen
Durable • No need for a separate • Easily
Conduct electricity pointing device scratched
Capacitive • Easy to keep clean • Less precise
touchscreen Finger causes a change in electrical than a mouse
charge and can be measured precisely
• Limited to
OMR
• Fast processing specific forms
Read marks on exam paper in
• Reduced human error • Cannot read
Optical Mark pen/pencil
handwriting
Recognition
• Can struggle
with complex
OCR • Fast data entry layouts
• Accurate and less • Font dependent
Text to digital data
Optical Character error prone • Not always
Recognition 100% accurate
• Expensive

• Requires line-
• Fast and accurate
of-sight
• Low cost
• Barcodes can
• Allows for automatic
Barcode scanner Reads barcode labels be
stock control
swapped/altered
• Tried & trusted
by consumers

• Easier than passwords • Privacy


Biometric • More secure concerns
Fingerprint/facial/voice/iris recognition
scanner • Speed • Expensive

• Fast
• Reader must be
Magnetic stripe • Simple to use
Debit/credit cards in close contact
reader • Secure (unreadable)

• Requires PIN
• Secure
Chip and PIN input
Retail card payments • Reduced fraud risk
reader • Potential for
skimming
8
• High payment
limits an issue
for stolen cards

• Fast transaction (no


pin)
• Transaction
• Data wirelessly
limit is smaller
transferred securely
• RFID signals
RFID reader Contactless payments • Retailers don't have to
can be
access customer
read/intercepted
credit/debit
information

• May require
• Generally accurate
calibration
• Provides real-time
• Data must be
information
converted to
• Automatic
Measure environmental data e.g. digital data
Analogue sensors • Can collect data from
temperature, light, sound, humidity etc. (ADC)
places where they
• Data may need
may be threat to
to be checked
human life
for accuracy

Output devices
What is an output device?
• Output devices are hardware components that receive information from a computer
system and present it to the user in a comprehensible form
• They enable the computer to communicate the results of processed data or commands

Types of output devices


Output device Use/features Advantages Disadvantages
• Run hot
• Large viewing angles • Heavy
• Can be used with light • Consume more power
CRT monitor Display output from a pens (than other monitor
computer types)
Screen size is measured
• Motion blur/ghosting
diagonally in inches • Low power
• Colour & contrast
• Lightweight
variable from
LCD monitor Resolution is the • No flickering
different viewing
number • No image burn-in
angles
of pixels measured
horizontally across the
• No motion blur/ghosting • More expensive (than
screen
• Low power LCD)
LED monitor
• Long life • Contrast can be poor

High volume printing


• Fast • Expensive initial cost
• High-quality prints • Limited to flat
Laser printer Electronically
• Lower cost per page surfaces
charged toner

9
Dry ink
Home printing &
photographs
• Lower initial cost • Slower
Uses wet ink separated
• High-quality prints • Higher cost per page
Inkjet printer into black, cyan,
• Ink can be refilled • Ink may smudge
magenta & yellow

Tiny dots sprayed onto


paper
Useful when • Low cost
printing multiple copies • Can print multi-part • Noisy
Dot matrix forms • Low print quality
printer Paper • Very good for long print • Slow
is impacted through runs
a ribbon of ink
• Limited materials
• Customisable designs • Slow process
Create real-life versions • Rapid prototyping • Counterfeit items
3D printer
of digital models • Medical benefits easier to produce
• Very expensive

• High accuracy
• Slow
• Can print on various
Create drawings & • Expensive to buy
Plotters materials
blueprints • Large size
• Inexpensive to run

• Requires darkened
• Large display room
Multimedia Output computer usually • Good for presentations • Expensive bulbs
projector to much larger display • Space saving • Need separate audio
• Quality is variable

• Range of sizes and power


• Expensive for higher
outputs
quality output
• Immersive audio
Speakers Output audio • Varying sound
• Helps people with
quality
disabilities

• Requires power
• Precise movement
• Potential mechanical
• Programmable
Control motors, pumps, wear
Actuators • Allow automatic control
switches etc. • Requires DAC
of many devices
interface

Worked Example
List two peripheral devices that could be used to input text by people who are unable to use a mouse and
keyboard

[2]

10
Answer

Any two from:

• Microphone
• Touchscreen
• Trackpad
• (Graphics) tablet
• Camera / Eye tracker / Gesture sensor/reader

ICT Systems to Meet Specified Needs


Devices & peripherals to meet specific needs
• When selecting digital devices and peripherals to meet specific needs, it is crucial to consider the
tasks they are intended for and the user's requirements

Devices
• Desktops: Ideal for high-performance tasks including graphic design, and video editing
• Laptops: Portable, with similar functionality to a desktop, and suitable for a wide range of tasks
including studying and day-to-day business
• Tablets: Lightweight, touch-controlled, good for reading, browsing, and simple applications
• Smartphones: Highly portable, useful for communication and light computing tasks including email
and web browsing

Peripherals
• Keyboards and mouse: Essential for desktop setups and for ergonomic options to enhance comfort

Monitors: Larger screens improve productivity and reduce eye strain - they are also essential in
aiding the use of computers for users with severe visual impairment

Printers and scanners: Necessary for hard copy documentation, including increasing the size of
documentation for users

External storage: Provides additional or backup storage capacity

Peripherals to aid accessibility


• There are some essential peripherals which aid with accessibility, some of these include:
o Ergonomic keyboards: Designed to reduce strain on the hands, wrists and arms by
preventing repetitive stress injuries (RSI)
o Screen readers: Assist visually impaired users by reading text aloud to them
o Braille displays: Enable visually impaired users to read digital text
o Braille keyboard: Enables visually impaired users to use the keyboard effectively
o Braille printers: Prints a hard copy of a document in braille for visually impaired users to
read
o Haptic feedback/vibration devices: Provides feedback to the user without reliance of
visuals or sound
o Reading pen: Allows users with dyslexia to interpret text

Software to meet specific needs


• Software can be broken down into categories, depending on a user's needs, these include:

11
o Productivity software
o Specialised software
o Accessibility software

Productivity Software:
• Word processors: Essential for creating and editing documents
• Spreadsheets: Used for data analysis and data management
• Presentation tools: Vital for creating engaging presentations

Specialised Software:
• CAD programs: Necessary for design and engineering tasks
• Graphic design tools: Critical for creating visual content
• Database management systems: Important for organising and managing large data sets

Accessibility Software:
• Screen readers: Convert digital text into speech for visually impaired users
• Voice recognition software: Allows users to control devices and input text using voice commands
• Magnification tools: Enlarge text and images on the screen for users with low vision

Matching Software to User Needs:


• Ensures optimal performance and accessibility
• An example of this would be text-to-speech software which aids students with dyslexia in reading
and comprehension

Settings & ICT Systems to meet specific needs


• ICT systems and their settings and configured to greatly aid the user
• Many users have specific needs and they often demand a system which can be configured to suit
their needs
• Configuring a system can be done in a variety of ways, including:
o System configurations
o Adjusting hardware and software settings

System Configuration
• Display settings: Adjust screen resolution, brightness, and font size for better readability
• Audio settings: Customise volume and audio output options to enhance listening experience
• Accessibility features: Enable high-contrast modes, screen magnifiers, and voice commands.

Hardware and software settings


• Using hardware and software settings to enhance a users experience and specifically meet their needs
comes with great benefits, these include:
o Enhances usability and productivity
o Ensures the ICT system meets specific operational and security requirements
• There are many ways hardware and software can be configured to meet a user's needs, some of these
include:
o Network settings
o Adding user permissions
o Security protocols
• Network settings: Configure network connections, set up virtual networks and manage bandwidth to
ensure users and guest users all have a positive experience
• User permissions: Assign user roles, restrict access to sensitive data, and ensure data security
• Security protocols: Implement firewalls, antivirus software, and encryption for enhanced data
protection

12
Accessibility
Hardware solutions
• Adjustable monitor stands: Provide ergonomic viewing positions to reduce strain
• Alternative input devices: Use trackballs, head pointers, or adaptive keyboards for users with
limited dexterity
• There is a wide variety of other accessibility hardware features available such as:
o Gesture interface
o Braille keyboards
o Reading pen
o Puff suck switch
o Foot pedals
o Eye typers

Software solutions
• Screen readers: Assist users with visual impairments by reading on-screen text aloud
• Voice-to-text applications: Enable users to dictate text and control devices via voice commands
• Customisable keyboard shortcuts: Simplify navigation and command execution for users with
motor impairments

Worked Example
Some learners have accessibility needs. Describe two way that ICT systems can be configured to support
learners with accessibility needs [4]

Answers

Gesture interface [1]


allows data entry for those with low levels of mobility/dexterity [1]

Braille keyboards [1]


would allow those with visual impairments to enter data [1]

Reading pen [1]


allows users with dyslexia to interpret text [1]

System Software & Application


Software
Purpose of application & system software
What is software?
• Software is the set of programs that control the hardware; they live on the computer system
but cannot be physically touched
• Software can be broken down in to two categories:
o Application software
o System software

13
What is application software?
• Application software (abbreviated 'apps') is software chosen by a user to help them carry out a
specific task
• Application software is installed on top of system software and is user-chosen to best suit industry
requirements
• Common categories of application software include:
o Word processing: creating and editing text documents
o Spreadsheet: organising and analysing data in a grid format
o Database management systems: storing, retrieving and managing data in databases
o Control/measurement: uses sensors to measure and control a system
o Video editing: creating and modifying video files
o Graphics editing: creating and modifying images
o Audio editing: creating and modifying sound files
o Computer-Aided Design (CAD): designing and modelling objects in 2D or 3D

Tips and Tricks


When writing about application software, ensure you refer to it by its type and not a brand name. For
example, 'word processing' and not Microsoft Word

What is system software?


• System software is software essential for the operation of a computer system
• Without system software, a user has no starting point for giving a computer instructions
• System software gives users a platform to run applications and carry out tasks
• Essential services carried out by system software include:
o Device drivers: controlling hardware components and peripherals
o Operating systems: managing the computer's resources and providing a user interface
o Utilities: tools for maintaining and optimising the computer's performance

14
Utility software
What is utility software?
• Utility software is software designed to help maintain, enhance and troubleshoot/repair a
computer system
• Utility software is designed to perform a limited number of tasks
• Utility software interacts with the computers hardware, for example, secondary storage devices
• Some utility software comes installed with the operating system
• Examples of utility software and their function are:

Defragmentation (maintain)
• Defragmentation software groups fragmented files back together in order to improve access
speed
• As programs and data are added to a new hard disk drive, it is added in order, over time as files are
deleted this leaves gaps
• As programs and data are added over time, these gaps get filled and data becomes fragmented
• Defragmentation can only used on magnetic storage

Compression (enhance)
• Compression reduces the amount of secondary storage required by performing an algorithm on the
original data by writing the number occurrences of same pattern.

Encryption (enhance)
• Encryption is the process of scrambling data using an algorithm from plain-text into cipher-text in
order to make it unreadable to users without the master key
• Encryption software enhances the security of the computer system and keeps data safe

Task manager (troubleshoot/repair)


• Task manager is software that is built into the operating system to allow users to monitor system
resources in order to help troubleshoot potential problems
• Task manager gives system information such as:
o Processes
o Performance
o App history
o Start-up apps
o Users
o Services

Worked Example
Describe how utility software can reduce access times for large files stored on magnetic media

[2]

15
Answer

• By defragmenting file data [1]...


• ...that has been allocated randomly to free space [1]
• By placing file data in adjacent sectors [1]...
• ...to reduce the need to spin the disc / seek across the platter surface [1]

Operating Systems
Role & function of an operating system
What is an operating system?
• An operating system (OS) is software that provides an interface between the user and the
hardware in a computer system
• An operating system hides the complexities of the hardware from the user, for example:
o A user does not need to know 'where' on secondary storage data is kept, just that it is saved
for when they want it again
• There are two main types of operating systems:
o Single User Operating System
o Network Operating Systems (NOS)
• An operating system has many functions, this includes:
o Memory management
o Resource management
o Security
o Print spooling

Single user and network operating systems


Single user Network
Allow for a single general user Provide access to network storage and shared resources
No option to customise user Server is sent requests when users log in with usernames and
interface for different users passwords
Typically used in a household User accounts are kept separate to ensure users cannot access each
appliances other's files
Resource management
• Memory
o Memory management is a process carried out by the operating system allocating main
memory (RAM) between different programs that are open at the same time
o The OS is responsible for copying programs and data from secondary to primary
storage as it is needed
o RAM is allocated based on priority and fairness, for example, system applications
(essential) may have a higher priority than user applications
o Memory management makes multitasking possible
• Processor
o Processor management is a process carried out by the operating system dividing time (time
slicing) in to small chunks and allocating them to different programs
o The CPU can only execute one instruction at a time, it can can execute billions of them in
one second.
o The OS decides what programs get access to the CPU to give a user the perception of being
able to use multiple programs at the same time (multitasking)

16
• Inputs & outputs
o Input/output (I/O) management is a process carried out by the operating system managing
the way input and output devices interact with software
o The OS allocates system resources to inputs/outputs to ensure efficient operation
o I/O management makes plug-and-play (PnP) functionality possible, automatically
detecting and configuring new inputs/outputs without the need for manually installing
device drivers or power cycling the system
• Files
o File management is a process carried out by the operating system creating, organising,
manipulating and accessing files and folders on a computer system
o The OS manages where data is stored in both primary and secondary storage
o File management gives the user the ability to:
▪ Create files/folders
▪ Name files/folders
▪ Rename files/folders
▪ Copy files/folders
▪ Move files/folders
▪ Delete files/folders
o The OS allows users to control who can access, modify and delete files/folders (permissions)
o The OS provides a search facility to find specific files based on various criteria

Security
• Security management is a process carried out by the operating system enabling different users to
log onto a computer
• A system administrator is able to allocate different access rights for different users on a network
• The OS is able to maintain settings for individual users, such as desktop backgrounds, icons and
colour schemes
• The OS audits (keeps a log of) files created by users, accesses, edits and deletes
• Operating systems can provide software firewalls

Print spooling
• Print spooling is a process carried out by the operating system when printing is required
• The spooler creates a temporary holding area (queue) for the print job
• Queuing pages increases efficiency

Worked Example
Explain one reason an administrator would use a network operating system to manage users.

[2]

Answer

A linked explanation such as:

• Multiple people can use the same computer [1] because users can be added/deleted [1]
• Only specific users can securely access their storage space [1] because user permissions can be
edited [1]
• Only certain users can install programs / access certain files [1] because user permissions can be
enforced [1]
• The limited storage on the machine can be shared [1] because the amount of resources/storage each
user can access can be controlled [1]

17
Application Software
Office-productivity tools
What are office productivity tools?
• Office productivity tools are applications designed to enable common work related tasks to be
carried out
• Office productivity tools are often combined into a single application suite

Word processing
• Word processing software is software used primarily for tasks involving text and images
• Common tasks include:
o Letters
o Reports
o Essays
o Books
• Examples of word processing applications include:
o Microsoft Word
o Google Docs

Spreadsheet
• Spreadsheet software is software used for tasks involving calculations
• Formulas and functions can be used to aid complex arithmetic calculations
• Examples of spreadsheet applications include:
o Microsoft Excel
o Google Sheets

Desktop publishing
• Desktop publishing software is software used for tasks that involve complicated page layouts
• Common tasks include:
o Newsletters
o Leaflets
• Examples of desktop publishing applications include:
o Microsoft Publisher
o Adobe InDesign

Database
• Database software is software used to store data
• Common features include:
o Data entry form design
o Perform queries to select data that meet a certain criteria
o Build reports to display data in a readable format
• Examples of database applications include:
o Microsoft Access
o Oracle MySQL

Web authoring software


What is web authoring software?
• Web authoring software is software designed to allow the creation of websites
• Websites are written in HTML and translated by web browsers to display in a way users can see
and read
• Web authoring software gives users with little to no HTML experience tools to help them create
web pages Uses a What You See Is What You Get (WYSIWYG) interface.

18
• Examples of web authoring applications include:
o Adobe Dreamweaver
o Google Sites

Image editing & sound editing software


What is image editing software?
• Image editing software is software that allows users to manipulate and enhance digital
photographs and images
• Common features include:
o Resizing
o Adjusting brightness & contrast
o Applying filters
o Cropping
• Examples of image editing applications include:
o Adobe Photoshop

What is sound editing software?


• Sound editing software is software that allows users to edit audio files
• Common features include:
o Cut and join audio clips
o Alter volume
o Change tempo
o Add effects
o Apply audio processing

Presentation software
What is presentation software?
• Presentation software is software designed to allow users to create multimedia content that can be
displayed typically on slides
• Common features include:
o Transitions & animations
o Presenter notes
o Automatic or timed navigation
• Examples of presentation applications include:
o Microsoft PowerPoint
o Google Slides

Control software
What is control software?
• Control software is software that users sensors to capture inputs, processes them and outputs
something
• They make something happen in the physical environment
• Outputs can be commands that control devices such as:
o Actuators
o Motors
• Commonly used in engineering, vehicles and building control

Project management software


What is project management software?
• Project management software is software designed make the organisation of projects more efficient
by tracking individual tasks
• Common features include:

19
o Timeline - shows a graphical representation of events and the time and order in which they
occur
o Critical path - allows a project manager to see the shortest time a project will take to
complete
o Milestones - a time or date by which a task must be completed
• Gannt charts are often used to visualise project timelines

Worked Example
Describe how application software is different from systems software

[2]

Answer

• Application software is used to carry out tasks for the user [1]
• Systems software carries out tasks for the machine/computer [1]

Software Licenses
Free/open source & proprietary software
What is a software licence?
• A software licence is a legal agreement that lays out rules for how software can and can't be used
• There are two main types of software licence, each with very different rules
on usage, distribution and support, they are:
o Free or open source
o Proprietary

Features of open source & proprietary software


Software Licence Features
• Free to modify, study, copy or distribute
Free
• Access to source code to edit/change
Open source • Able to edit and distribute

• Costs money
• Produced by 'professional' companies
Proprietary
• More regular official updates/support/upgrades/fixes

Tips and Tricks


In regard to free software, the term 'free' means free from restrictions and NOT the cost of the software

Advantages & disadvantages of open source & proprietary software


Software
Advantages Disadvantages
Licence
• Allows collaboration with other
people who may want the same
• Relies on support of other users
modifications
Free or open • To edit the code, you need expert
• Less buggy versions of the software
source knowledge
may appear faster
• May not receive regular updates
• Usually free, good for companies
with limited budgets
20
• Generally strong social support • Could be more open to exploitation
through users adding malicious
code

• Cost can be significant


• Generally free customer support • Limited expansion, only what is
• Created to professional standards available
Proprietary • Always someone to go back to with • Relies on one company
any problems • May not fully meet the need of the
user/customer

Worked Example
State what is meant by the term ‘open source software’. [2]

Answer

• It is available to users [1] to modify /distribute / viewed [1]

‘Free’ (in relation to cost) is not accepted

Communication Software
Communication Software
What is communication software?
• Communication software is software that provides remote access to systems
• To exchange files and messages in text, images, audio and/or video formats between different
computes or users
• Common examples of communication software include:
o Web browsers
o Email
o Social media
o SMS/MMS
o Instant messaging

Web browsers
• A web browser is a piece of software used to access and display information on the internet
• The purpose of a web browser is to render hypertext markup language (HTML) and display web
pages
• Web browsers interpret the code in HTML documents and translate it into a visual display for the
user

Email
• Email is a method of exchanging messages and files over the internet
• The main uses of email are:
o Personal communication
o Professional correspondence
o Marketing
• Companies provide guidelines about acceptable use of emails
• Guidelines about emails from a company include:
o Purpose of the email
o Using acceptable language
21
o Email security, including anti-virus software

Social media
• Social media is a platform where users can connect with others and share content
• They include platforms such as
o Facebook
o Tiktok
• Social media platforms usually require users to create a profile and allow them to share text,
images, videos, and links
• They facilitate interaction, collaboration, and information sharing on a large scale
• Privacy settings allow users to control who can see their content

SMS/MMS
• Short messaging service (SMS) and multimedia messages service (MMS) are a method of
communication using a mobile phone network
• No internet connection is required

Instant messaging
• Instant messaging requires an internet connection to allow multimedia communication between
single and groups of users
• Includes extra features such as:
o See when users are typing (online/offline status)
o Include location data

Worked Example
Describe the function of a web browser [2]

Answer

A description such as:

• To access/request/render/display [1] HTML / web pages [1]

Website / web content is acceptable for web page

Software Updates
Why is software updated?
• Software is updated to:
o Fix bugs or software vulnerabilities
o Increase compatibility with newer operating systems
o Improve performance
o Introduce new features
o Improve usability
• Updates are typically downloaded from the internet by a user or automatically from within the
software itself
• Operating system can schedule updates to suit user needs and minimise disruption

What are the risks of updating software?


• Software updates typically require the removal of components to be replaced with new ones
• This process can cause
o Incompatibility - may not work with older hardware or software

22
o Workflow disruption - new features/interface tweaks may need time to adjust to, slowing
down productivity
o Update issues - in rare cases the installation process can go wrong, leading to data loss

What are the risks of NOT updating software?


• Software is often released in a less than perfect state and flaws/vulnerabilities may exist which can
provide an opportunity for hackers
• Unpatched/outdated software can lead to:
o Data breaches
o Installation of malware

Worked Example
Fyn want to play a game he installed a year ago

A. Describe how Fyn can update the game software [2]

B. Give 2 reasons why Fyn should update the game software [2]

Answers

A.

• Download (the update file) [1]


• Install (the file) [1]

B.

• Any two from:


o To get new features (perfective)
o Improve compatibility e.g. with operating system/hardware changes (adaptive)
o To fix/patch bugs (corrective)
o To protect against new security vulnerabilities (preventative)

Ch-3 Memory
RAM & ROM
What is RAM?
• RAM (Random Access Memory) is primary storage that is directly connected to the CPU and holds
the data and instructions that are currently in use (temporary)
• RAM is volatile which means the contents of RAM are lost when the power is turned off
• For the CPU to access the data and instructions they must be copied from secondary storage

23
• RAM is very fast working memory, much faster than secondary storage
• RAM is read/write which means data can be read from and written to
• In comparison to ROM, it has a much larger capacity
• RAM capacity can be increased to improve performance

What is ROM?
• ROM (Read Only Memory) is primary storage that holds the first instructions a computer needs
to start up (Boot file)
• ROM contains the BIOS (Basic Input Output System)
• ROM is a small memory chip located on the computers motherboard
• ROM is fast memory, much faster than secondary storage but slower than RAM
• ROM is non-volatile which means the contents of ROM are not lost when the power is turned off
• ROM is read only which means data can only be read from
• In comparison to RAM, it has a much smaller capacity
• ROM capacity can not be increased
• Some types of ROM can be changed
o EPROM - erasable programmable read only memory
o EEPROM - electronically erasable programmable read only memory

Differences between RAM & ROM


Feature RAM ROM
Stores Data & programs in use Boot file (start-up instructions)
Capacity Variable Fixed
Contents Temporary Permanent
Read/Write Read & write Read only
Volatile/Non-volatile Volatile Non-volatile
Flash memory
What is flash memory?
• Flash memory is a type of EEPROM (Electronically Erasable Programmable Read Only Memory)
• Non-volatile
• Fast access times
• Low power consumption
• Used in solid state drives, USB drives and SD memory cards

Worked Example
Explain one negative impact of a user decreasing the amount of RAM in a computer

[3]

Answer

• Programs will load more slowly / Fewer applications can be open at the same time [1]...
• ...as they are more reliant on being read from secondary storage / virtual memory / HDD / SSD [1]...
• ...which has slower read/write times than RAM [1]

Secondary Storage Devices


Storage devices
What is a storage device?
• A storage device is the hardware that reads from and writes to different storage medias

24
• Storage devices are non-volatile secondary storage, that retain digital data within a computer
system
• They provide a means of storing, accessing, and retrieving data, which can include software
applications, documents, images, videos, and more
• There are 3 types of storage device:
o Magnetic
o Solid State
o Optical

Magnetic storage
• Magnetic storage is a type of non-volatile media that uses magnets (polarity) to store binary 0s and
1s

Advantages Disadvantages
Capacity - High storage Durability - Moving parts can get damaged if dropped
Cost - Low per gigabyte Portability - Heavy & bulky making them less convenient for transport
Speed - Moderate read/write access Reliability - Prone to mechanical failure
Noise - Loud (spinning disks)
Solid state storage
• Solid state storage is a type of non-volatile media that uses electronic circuits to store binary 0s and
1s

Advantages Disadvantages
Capacity - Medium/high storage Cost - Very high per gigabyte
Speed - Very fast read/write access Reliability - Limited read/write cycles
Durability - No moving parts
Portability - Small and no moving parts
Noise - Silent
Optical storage
• Optical storage is a type of non-volatile media that uses lasers to burn the surface of a disk, creating
pits and lands suitable for storing binary 0s and 1s

Advantages Disadvantages
Cost - Very low per gigabyte Capacity - Very low
Durability - No moving parts Speed - Very slow read/write access
Portability - Small and no moving parts Reliability - Prone to scratches
Noise - Silent
Capacity of storage
What is capacity of storage?
• Capacity of storage describe the amounts of binary digits that can be stored on a digital device
• These are the units you need to know for this IGCSE:

Unit Symbol Value


Bit b 1 or 0
Nibble 4b
Byte B 8b
Kibibyte KiB 1024 B (210)
Mebibyte MiB 1,048,576 KB (220)
Gibibyte GiB 1,073,741,824 MB (230)
Tebibyte TiB 1,099,511,626,776GB (240)
25
Megabyte vs Mebibyte
• 1 kibibyte = 1024 bits - binary prefixes (to the power of 2)
• 1 kilobyte = 1000 bits - decimal prefixes (to the power of 10)

Worked Example
Explain one benefit of using solid state storage with a smartphone [2]

Answer

An explanation such as:

• Data (transfer) will not be negatively affected by movement / less risk of damage to the drive [1]...
• ...because solid state storage does not use moving parts [1]

OR

• Smartphones are portable [1]...


• ...because solid state storage takes up less space / has no moving parts [1]

OR

• Longer battery life [1]...


• ...because solid state storage uses less power [1]

Storage Media
What is storage media?
• Storage media is the physical media that holds non-volatile data
• Storage devices have a specific read/write mechanism built in to interact with a particular storage
media
• For example, magnetic tape media is read by a magnetic storage device

Tips and Tricks


Try not to get confused between storage devices and storage media.
Think of storage devices as large pieces of furniture in your home e.g. bookshelf, chest of drawers etc.
Storage media is what you store in the furniture e.g. books on the shelf or clothes in the drawers
Storage media all hold data, but the way it stores/accesses it can be very different, so just like you wouldn't
store clothes on a bookshelf, you need to pair the correct storage device and storage media

Media
Hard disks
• Hard disks are a magnetic storage media
• Made up of platters that spin on a central spindle
• A read/write head moves on an arm across the platter to read/write data
• The amount of time taken to read/write data is influenced by:
o How fast the platters spin (measured in revolutions per minute (RPM))
o How fast the head moves across the platter
• Used in personal computers, servers and backups

26
Optical media
• Used with an optical storage device
• All optical media is recordable (CD-R, DVD-R, BD-R)
• Some optical media can be re-written (CD-RW, DVD-RW, BD-RE)
• Used for multimedia (music, games & films)

CDs DVDs Blu-ray


4.7 GB single sided/single layer 25 GB single sided
up to 700 MB data
18 GB double sides/double layer 50 GB double sided
Flash media
• Flash media is a solid state storage media
• More reliable than a hard disk as contains no moving parts
• Very fast read/write speeds
• Used in mobile devices, laptops

Magnetic tape
• Old technology used primarily for recording sound
• Now used to store vast amounts of data (backups)
• Very slow read/write speeds
• Used for whole system backups and archives

Worked Example
A USB flash memory card has 64 MiB of storage capacity.

Construct an expression to show how many bits are in 64 MiB [3]

Answer

• 1 mark for sight of 8


• 1 mark for sight of 1024
• 1 mark for complete expression: 64 x 10242 x 8
o …including all parts multiplied
• All three marks for the result of the calculation: 536,870,912

Central Processing Unit (CPU)


What is the purpose of the CPU?
• The purpose of the Central Processing Unit (CPU) is to execute instructions
• The CPU achieves this by completing processor cycles
• A modern CPU is capable of performing billions of processor cycles in one second

The processor cycle stages


Fetch stage
• During the fetch stage of the cycle, the next instruction or data must be fetched from the
computer's memory (RAM)
• The instruction or data is brought back to the CPU

Decode stage
• During the decode stage of the cycle, the CPU needs to work out what is required from the
instruction
• This could be a range of tasks depending on what the instruction or data included
27
Execute stage
• During the execute stage of the cycle, the CPU will carry out the instruction that was fetched
• Some examples that would take place at this stage are
o Performing a calculation
o Storing a result or data back in main memory (RAM)
o Going to main memory to fetch data from a different location

How is the speed of a processor measured?


• The speed of a processor is measured by it's clock speed
• Clock speed is measured in Hertz (Hz)
• The clock speed measures the number of processor cycles that can take place in 1 second
• The faster the clock speed, the more instructions can be fetched and executed per second
• Modern computers have a clock speed in Gigahertz (GHz), meaning billion
• A clock speed of 3.5GHz can perform up to 3.5 billion instructions per second

Number of cores
• A core works like it is its own CPU
• Multiple core processors mean they have multiple separate processing units that can fetch, decode
and execute instructions at the same time
• Multi-core processors can run more powerful programs with greater ease
• Multiple cores increase the performance of the CPU by working with the clock speed
o Example: A quad-core CPU (4 cores), running at a clock speed of 3Ghz
▪ 4 cores x 3GHz
▪ 4 x 3 billion instructions
▪ 12 billion instructions per second

Worked Example
Describe how the speed of the processor affects a users experience when playing a game [4]

Answer

A description to include four from:

• Faster processors fetch/decode/execute more instructions/data / have more cycles [1] per second [1]

so:

• graphics render more quickly / at greater resolution [1]


• making the visuals smoother / graphics can be displayed at greater resolution [1]
• making the environment more realistic [1]
• more actions can be carried out [1]
• making the gameplay more immersive/exciting [1]

Ch-3 Connectivity
How Digital Devices Communicate
Satellite
What is satellite communication?
• Satellite communication uses radio waves for wireless communication

28
• Signals are sent between satellites and ground stations on earth
• Ground stations transmit the radio wave to antenna within or connected to a digital devices
• The advantage of satellite communication is that the service is always available
• The disadvantages of satellite communication is that the service can be interrupted by weather
conditions and signals do not pass through solid objects

Satellite television
• Digital Video Broadcasting (DVB) is the international standard for broadcasting digital television
• Digital Video Broadcasting-Satellite (DVB-S) is an example of DVB
• A video signal is sent from a broadcaster to a satellite, and sent back to earth to an antenna
connected to a set-top box or directly to a television
• The set-top box or television decodes the signal to make it watchable

TV & radio
What is digital television and radio?
• Digital Video Broadcasting Terrestrial (DVB-T) and Digital Audio Broadcasting (DAB) are methods
of transmitting video and audio signals from transmitters to an antenna
• Transmitters are based on earth
• Once received by the antenna, signals travel through wires to a television or radio receiver
which decodes the signal and converts it into video and/or audio
• The advantages of digital television and radio are:
o Improved video/audio quality
o Access to more channels/stations

Wired
What are wired methods of communication?
• There are a number of wired methods of communication, some are designed to transmit a specific
type of data and some are universal

Type Use
High Definition Multimedia
High definition video and audio signals
Interface (HDMI)
Sony/Phillips Digital Interface
Transmit digital audio streams between devices
Format (S/PDIF)
3.5mm jack commonly used to connect headphones, speakers and
Mini-jack
microphones to devices
Ethernet Networking standard for connecting devices to a local area network (LAN)
Connecting and powering various devices such as printers, flash drives,
Universal Serial Bus (USB)
keyboards, mice etc.
Wireless
What are wireless methods of communication?
• There are a number of wireless methods of communication, including:

Type Use
Wireless Fidelity (Wi-Fi) A wireless method of connecting devices to a local area network (LAN)
Bluetooth Allows two devices to connect to each other over very short distances
Infra-red (IR) Transmits tiny amounts of data over very short distances
Near Field
Use close proximity RFID (radio frequency identification)
Communication (NFC)
4G and 5G Provides internet access to mobile devices

29
Worked Example
Smartphones can be connected using wired or wireless methods.

A. Give two advantages of using a wired method to connect to a smartphone [2]

B. Give two advantages of using a wireless method to connect to a smartphone [2]

Answers

A. Any two from:

• Faster / higher bandwidth / lower latency [1]


• More stable connection [1]
• Less interference (e.g. dropped packets, loss of data) / Not affected by physical obstructions (e.g.
walls) [1]
• More secure [1]
• Password not needed [1]

B. Any two from:

• Can move around (while transferring data) [1]


• Does not have to waste time finding / connecting cables [1]
• Cost of cables / cheaper [1]
• Health and safety / no trailing wires [1]

Networks
Local area networks (LANs)
What is a local area network?
• A local area network (LAN) is a network which has a small
geographical area (under 1 mile)
• All of the hardware is owned by the
company/organisation/household using it
• LANs will use unshielded twisted pair (UTP) cable, fibre optic cable or
wireless connections (Wi-Fi)

Advantages and disadvantages of LANs


Advantages Disadvantages
Allows centralised management of updates, If hardware fails, the network may not function
backups and software installations properly or even at all
Can secure its devices with the use of firewalls,
Networks are more prone to attacks than standalone
antivirus software and other security features to
computers
prevent unauthorised access
Allows users on the network to share Access to data and peripherals can be slow depending
resources such as printers and other peripherals on network traffic
Allows the users of the network Require maintenance to ensure that software is up to
to collaborate and share files and folders date, upgrades and backups which can be costly

30
Wide area networks (WANs)
What is a wide area network?
• A wide area network (WAN) is a network which has a large geographical
area (over 1 mile)
• They are a collection of LANs joined together
• The computers on a WAN are connected via routers
• The hardware used to connect the networks together is not all owned by the
company/organisation/household using it.
• For example, telephone lines owned by telecommunication companies
• WANs will use fibre optic cable, telephone lines and satellite to connect the LANs together

Personal area networks (PANs)


What is a PAN?
• A personal area network (PAN) is a network that is used for transmission of data between devices
in close proximity
• A PAN has a very short range (10 metres)
• Bluetooth is the most widely used PAN
• Typical examples of devices which make use of a PAN are:
o Wireless headphones
o Mobile phones
o Tablet
o Laptop etc.

Tethering
What is tethering?
• Tethering is when a host device shares its internet connection with other connected devices
• Commonly used by mobile devices to share its mobile data connection to devices such
as laptops and tablets
• Tethering can be enabled or disabled as part of the mobile contract
• Some network providers charge extra to use this feature

Worked Example
Draw a diagram to show how a smartphone can be used to provide a tablet computer with an Internet
connection.

Label each component and the connectivity you use in your diagram [4]

Answer

A drawing that shows:

• A smartphone connected to the Internet / mobile phone mast [1]


• Correct connectivity identified for this (3G, 4G etc.) [1]
• Tablet directly connected to smartphone [1]
• Correct connectivity identified for this (Bluetooth / Wi-Fi / USB etc.) [1]

Wireless Communications
31
Wi-Fi
What is Wi-Fi?

• Wireless fidelity (Wi-Fi) is a common standard for wireless networks


• Wi-Fi is common in most homes and offices to connect devices such
as laptops, tablets & smart phones
• Using Wi-Fi, devices communicate with a hotspot or a wireless
access point (WAP), which can be a standalone device or built into
a router or switch
• Wi-Fi may be preferred over Bluetooth when:
o High speed data transfer is required
o Long range communication is required
o Many devices are needed to be connected at the same time

Advantages Disadvantages
• Portability - Easy to move around, location is • Speed - Slower data transfer than
only limited by range Ethernet
• Cost - Less expensive to setup and add new • Security - Less secure than Ethernet
devices • Range - Relies on signal strength to the
• Compatibility - Most devices are manufactured WAP, signals can be obstructed (up to
with a built in Wi-Fi adapter 100m)

Bluetooth
What is Bluetooth?
• Bluetooth is another common standard for wireless networks
• Bluetooth is common in most homes and offices to connect devices such
as headphones, controllers, keyboards & mice
• Bluetooth is used typically for a direct connection between two devices
• When two devices pair, they both exchange a cryptographic key
• The keys are used to generate a secret shared key which is used to encrypt the data between the
two devices and create a Wireless Personal Area Network (WPAN)

Advantages Disadvantages
• Compatibility - Ideal for personal • Speed - Very slow transfer speeds
devices and ad-hoc connections • Security - Data can be intercepted by anyone in range
• Power - Very low power consumption • Range - Short range (30m)

Differences between Bluetooth and Wi-Fi


Bluetooth Wi-Fi
Maximum number of connections Less more
Transmission frequency 2.4Ghz 2.4Ghz, 5Ghz
Maximum range (meters) 30 meters 100 meters (depending on obstructions)
Maximum transfer speed
3 Mbytes / Sec 75 Mbytes / Sec
(Depending on the standard being
used)
GPS
What is GPS?
• Global Positioning System (GPS) is a satellite system used to track the exact location of an object
• GPS uses orbiting satellites to receive, amplify and transmit signals
32
• Radio frequencies are used to communicate between satellites and ground stations
• GPS requires a direct line of sight

Advantages Disadvantages
• Wide coverage area • Expensive setup and maintenance
• Real-time data transmission • Signal interference due to weather or obstacles
• Improved communication in remote locations • Limited bandwidth and capacity
• Accurate location tracking • Privacy concerns and potential for Surveillance

3G & 4G
What is 3G & 4G?
• 3G and 4G are references to the 3rd and 4th generation of mobile data networks
• They provide mobile devices with wireless access to the internet
• Each generation has a faster transfer rate and an improved capacity for more users
o 3G - 256 Kbps (kilobits per second)
o 4G - 100+ Mbps (megabits per second)
• The current generation (5G) has even faster speeds and lower latency

Infra-red (IR)
What is infra-red?
• Infra-red is a wireless communication method used to transfer very small amounts of data to a
device in direct line of sight
• Commonly used in remotes to control devices such as:
o Televisions
o Audio receivers
o Home entertainment equipment etc.
• Uses light waves which can cause:
o Walls or obstacles to block the signal
o Sunlight to affect the signal
• It is a reliable and cost effective solution for many short-range wireless communication needs

NFC
What is NFC?
• Near field communication (NFC) is a subset of RFID which allows communication between two
devices in very close proximity
• NFC can be either:
o Passive - uses energy from the reader
o Active - has it's own power source
• Smartphones use active NFC to allow contactless payments by tapping a smartphone on a reader
• Smartphones can also exchange data using NFC by tapping together (usually back to back)

Advantages Disadvantages
• Convenient • Limited range
• Secure • Slow data transfer rate (not suitable for
• Very fast transferring large files)
• Low power consumption • Compatibility

Worked Example
George uses a smartwatch when he exercises outside.

The smartwatch connects to a wireless health monitor to track his heart rate.
33
The health monitor uses Wi-Fi to transfer data to the smartwatch.

A. Speed is not a concern. Explain why Wi-Fi is a better choice than infrared for this transfer [2]

B. Explain why distance might affect the speed of the transfer [2]

Answers

A. An explanation such as:

• Wi-Fi does not require line of sight / Infrared requires line of sight [1] which is not always possible
when moving/exercising [1]

OR

• Infrared is / Wi-Fi is not affected by sunlight [1] (which will affect the data transfer because) the
health monitor will be used outside [1]

B. An explanation to include two from:

• More packets of data have to be requested again [1]


• ...because a signal degrades / gets weaker as it travels [1]
• ...due to (more opportunities for) interference / spreading out of the radio waves [1]

Factors Influencing Digital Communication


Bandwidth & latency
What is bandwidth?
• Bandwidth is the amount of data that can be carried by a connection in one second
• Measured in bits per second (bit rate)
• A smaller bandwidth means that less data can be sent and the network can slow down, potentially to
the point of becoming unusable

Impact on user experience


• A higher bandwidth means more data can be sent and received in one second
• Higher bandwidth can improve:
o Upload and download speeds
o Online gaming
o Streaming high definition video
• To stream content, enough data to play a few seconds is downloaded and stored in a temporary
area of memory called a buffer
• As the contents of the buffer are played, more data is downloaded at the same time to keep the
buffer full
• If the buffer ever becomes empty playback will pause
• To stream successfully, data must be downloaded to the buffer at a faster rate than it is being
emptied

What is latency?
• Latency is the delay between data being sent and received
• If there is a big delay between the two, more data will be on the network causing collisions
• This can lead to even more packets of data being sent as the error rate will increase

34
Impact on user experience
• Playing games online smoothly, requires a high bandwidth
• A high latency can cause lag and the game will not respond as quickly as a users commands
• This can cause big issues when users are playing fast paced games or playing against other users
with a lower latency (have an advantage due to quicker response times)
• Streaming sport content with a high latency can cause micro-stutters and ruin a users watching
experience

Speed & volume of data transfer


What else can affect the speed & volume of data transfer?
Factor Description
Devices that emit electromagnetic signals such as microwaves and fridges can disrupt
Interference
wireless signals
Transfer Wired connections can carry more frequencies, meaning a higher bandwidth compared to
method wireless connections
Blockages Walls and furniture can block wireless signals, lowering the bandwidth available
Distance The strength of a wired and wireless signals reduces as data has to travel further
Wired & wireless communication
What are the advantages and disadvantages of wired & wireless communication?
Wired Wireless
Speed Fast data transfer Slower than wired
Portability Location is limited by physical cable Location only limited by range
Security Better physical security Less secure, easier to intercept data
Range Less affected by interference Affected by interference
Cables can be trip hazards, need routing along
Safety None
walls, under floors
Cables are cheap, more devices means more No cables required, may require a wireless access
Cost
cables needed point to be purchased
Broadband, mobile broadband & cellular networks
• Internet Service Providers (ISP) provide access to high speed internet (broadband)
• ISPs use fibre optic or copper cable to create a wide area network (WAN)

Worked Example
Describe how high latency can affect the experience of making a video call from a smartphone [2]

Answer

• It increases the time it takes for data to be transferred between devices [1] meaning his voice/video is
out of sync / lagging / delayed [1]

Identifying Devices

35
IP Addresses
What is an IP address?
• An IP (Internet Protocol) address is a unique identifier given to devices which communicate over
the Internet (WAN)
• IP addresses can be allocated by a network administrator or assigned dynamically by a Dynamic
Host Configuration Protocol server (DHCP)
• IP addresses make it possible to deliver data to the right device
• A device connecting to a network will be given an IP address, if it moves to a different network then
the IP address will change

IPv4
• Internet Protocol version 4 is represented as 4 blocks of denary numbers between 0 and 255,
separated by full stops
• Each block is one byte (8 bits), each address is 4 bytes (32 bits)

• IPv4 provides over 4 billion unique addresses (232), however, with over 7 billion people
and countless devices per person, a solution was needed

IPv6
• Internet Protocol version 6 is represented as 8 blocks of 4 hexadecimal digits, separated by colons
• Each block is 2 bytes (16 bits), each address is 16 bytes (128 bits)

• IPv6 could provide over one billion unique addresses for every person on the planet (2128)

MAC Addresses
What is a MAC address?
• A MAC (Media Access Control) address is a universally unique identifier given to devices which
communicate over a local area network (LAN)
• MAC addresses are static, they can never change
• MAC addresses make it possible for switches to efficiently forward data to the intended recipient
• Any device that contains a Network Interface Card (NIC) has a MAC address assigned during
manufacturing
• A device connecting to a local network already has a MAC address, if it moves to a different
network then the MAC address will stay the same

36
• A MAC address is represented as 12 hexadecimal digits (48 bits), usually grouped in pairs
• The first three pairs are the manufacturer ID number (OUI) and the last three pairs are the serial
number of the network interface card (NIC)
• There are enough unique MAC addresses for roughly 281 trillion devices
• MAC addresses can be used to:
o Restrict or allow access to a network
o Identify a device on a network
o Track a device
o Assign 'static' or 'fixed' IP addresses

Device name
What is a device name?
• A device name is a way for users to describe/name a device so that it is easier to identify on a
network
• Device names are not used by devices to communicate as they are not always unique
• Device names are set by users in the devices operating system or from a router

Worked Example
Computers in a network can be identified using both IP addresses and MAC addresses.

Describe two differences between IP addresses and MAC addresses [2]

Answer

• IP address is dynamic/can change // MAC address is static/cannot change [1]


• IP address is used to communicate on a WAN/Internet // MAC address is used to communicate on a
LAN [1]

Components of a Network
Cables
What cables are used in a wired network?
• A wired network is a network where physical cables are used to join devices together and transmit
data
• The most common types of cables in a wired network are:
o Ethernet
o Fibre optic

37
What is Ethernet?

• Ethernet is a wired networking standard to carry electrical signals between devices


on a local area network (LAN)
• Ethernet is common in most offices and homes to connect devices such
a desktop computers & servers
• Ethernet uses twisted pair cables (CAT5) to allow duplex communication

What is copper cable?

• Copper is a type of cable originally used in telecommunication to transmit voice signals, forming
the traditional landline phone network
• The ability to use copper to deliver network traffic on a wide area network (WAN) made
the internet possible
• Copper cables degrade over time which limits their range compared to fibre
optic
• Copper cable suffers from interference which can disrupt data quality
• Copper transmits data at a much slower rate, and has a much lower
bandwidth compared to fibre optic

What is fibre optic?

• Fibre optic is a type of cable that uses light to transmit data on a wide area network (WAN)
• Fibre transmits data at a much higher speed and has a much higher
bandwidth compared to copper cables
• Fibre optic cable does not suffer from interference which makes them
the most secure option to send sensitive data
• Fibre optic cables can cover a long distance without any degradation,
they can span cities and countries

Wireless Access Points


What is a wireless access point (WAP)?
• The Wireless Access Point (WAP) allows wireless devices to connect to a local
area network (LAN)
• The WAP connects to a Switch or Hub via an Ethernet cable
• The WAP range is limited so the use of multiple Wireless Access Points can be
used for complete coverage or a home/business

Router & gateway


What is a router?
• The router is responsible for routing data packets between different networks
• An example of data the router can direct is, sending internet traffic to the
right devices in your home
• The router manages and prioritise data traffic, which can help to keep
connections stable
• The router will assign IP addresses to the devices on the network
• The router acts as a gateway

38
What is a gateway?
• A gateway is a device that bridges the connection between two different types of network
• Gateways translate between different network protocols
• For example, a local area network (LAN) to a wide area network (WAN)

Switch & boosters


What is a switch?
• A Switch allows multiple wired devices to connect to a local area
network (LAN)
• The Switch is an active device, which means it can inspect
network data and route it to the correct device, thus reducing traffic
on the network
• A Switch can contain extra Software to allow administration/configuration

What is a booster?
• A booster is a device used to amplify a network signal in order to extend the normal range
• Boosters can be used with both wired and wireless networks
• Wireless access points can be be configured to act as a booster (repeater mode)

Server
What is a server?
• A server is a dedicated computer that shares its resources with devices that connect to it
• Devices that connect to a server are known as clients
• Common examples of servers include:
o File
o Web
o Print
o Authentication
o Application

Server Function
• Allows access to shared and private resources
File
• Stores the content of websites and processes requests made via HTTP to access
Web them

• Manages print jobs and organises the queue so that individual printers are not
Print overloaded

• Stores usernames and passwords that can be checked when a user logs in
Authentication • Authenticated users receive a certificate that allows access to resources

• Allows clients access to applications that run directly from the server
Application
• A single computer can perform multiple server functions depending on its resources (memory &
processor)

39
Worked Example
One piece of network hardware is a router.

State 3 tasks carried out by a router. [3]

Answer

1 mark each to max 3 e.g.

• Receive packets [1]


• Forward/send packets [1]
• Maintain a routing table [1]
• Identify the most efficient path to the destination / correct IP / correct location [1]
• Assign IP addresses to nodes / devices [1]

Connecting to the Internet


Web browser
What is a web browser?
• A web browser is a software application used to locate, retrieve, and display content on the World
Wide Web (WWW)
• Web browsers are used to display web pages which include images, videos and other files
• Most web browsers have the following features:
o Home page
o Ability to bookmark favourites
o Keep a history of visited websites
o Hyperlinks which allow users to navigate between pages

Internet Service Provider (ISP)


What is an ISP?
• An Internet Service Providers (ISP) is a company that provides access to the Internet to users and
businesses
• The ISP provides internet access by leasing equipment and telecommunication lines to users that
are required to access the internet

Search Engines
What are Search Engines?
• Search engines are tools that locate and display web pages related to the search terms entered by
the user
• They are essential for navigating the vast amount of information on the internet
• They index millions of web pages and use algorithms to rank the relevance of each page to the
search terms

Filter software
What is filter software?
• Filter software uses two lists stored in a database to allow or block access to websites
• URLs entered by a user are compared against both lists
• The two lists are:
o Whitelist - URLs on the whitelist are allowed and the website can be viewed
o Blacklist - URLs on the blacklist are not allowed and the website is blocked
• URLs that cannot be found on either list are allowed

40
• Filter software is used by schools and parents to protect children from accessing age
inappropriate content
• Administrators can add and remove URLs from the lists

Benefits of using a Local Area Network (LAN)


Benefits of using a Local Area Network (LAN)
What are the benefits of a LAN?
• Users can share peripherals such as printers
• Shared access to the internet
• Users can access their files from any computer on the network
• Communication can be made easier via email and social networks
• Users can share files and folders easily such as central databases and spreadsheets
• Servers can be used to provide centralised backups, updates and security
• Media streaming (movies, music and gaming)

What are the drawbacks of a LAN?


• There is an increased security risk to data
• Malicious software can infiltrate the network and render it unusable
• Servers and switches can provide a central point of failure, resulting in users not being able to
complete tasks using their computer
• Factors can impact the performance of the network such as the number of users and data on the
network at one time

Worked Example
Zarmeen connects her laptop to a local area network.

Describe two benefits of doing this. [4]

Answer

• Shared peripherals [1] means reduced cost/time to access a central one [1]
• Shared data [1] allows easier collaboration [1]
• Flexible access [1] allows hot desking [1]
• Shared access to the Internet [1] reduces need for individual connectivity [1]

Peer-to-Peer & Client-Server Networks


Peer-to-peer networks
What is a peer-to-peer network?
• A peer is a computer on a network which is equal to all other computers
• Each peer on the network
o Often have their own printer attached
o Will provide access to their own files
o Is responsible for their own backups
o Is responsible for their own security
o Is responsible for carrying out their own backups
• A network with no server providing services is a peer-to-peer network
• Most homes will have a peer-to-peer network model

41
Advantages Disadvantages
• Very easy to set up and maintain • Users will need to manage their own
• Very cheap to set up because there is no expensive backups
hardware to purchase • Users will need to manage their own
• No specialist knowledge or staff are required to run the software updates
network • The network can be less secure

Tips and Tricks


If you are asked about a peer-to-peer network, just think about how your home network is set up and how
each computer is responsible for itself, there is no one computer in charge of all of the others.

Client-server networks
What is a client-server network?
• A client is a computer on the network, these connect to the server via a switch
• A server is a computer on a network which often has a single purpose, for example
o Managing access to the Internet
o Managing printing
o Providing email services
o Providing backups
o Controlling security
• Servers are often more powerful than the client machines
• Servers are seen as more significant than the client machines and can require specialist hardware
and software
• A network which uses a server is called a client-server model
• Most companies, organisations and schools will use a client-server network model

Advantages Disadvantages
• Servers can be expensive to purchase, setup and
• Managing backups of the network is easier as
maintain
it is done from one central point
• A specialist network manager would be required
• Updating and installing new software can be
as servers require specialist IT knowledge
done centrally instead of having to log on to
• Servers can be a single point of failure, meaning
each machine
all users would lose access to the network if the
• Security of files can be managed easily
server fails

Worked Example
Describe two drawbacks of using a peer-to-peer network [4]

Answer

Any two descriptions from:

• No control of user access rights [1] reduces security [1]


• No centralised administration [1] means no remote updates [1]
• No centralised backup [1] so each client has to be backed up separately [1]
• …so individual backup devices need to be used on each device [1] costing more [1]
• No shared software [1] meaning more installs [1]
• No shared storage / file access [1] increasing need for storage on each device / access from
anywhere [1]
42
• No roaming profiles [1] meaning users cannot ‘hot-desk’ [1]

Methods of Securing a Network


Usernames & Passwords
How does a password help?
• Passwords are a digital lock to prevent unauthorised access to an account
• Passwords are used to authenticate a user to the network
• They are often stored as an encrypted/ciphered text entry in a database, ensuring that even with
unauthorised access to a database, a hacker would not be able to gain access to the individual
passwords of users
• Strong passwords and regular password changes are important to maintain security

Firewalls
What is a firewall?
• A firewall is a barrier between a network and the internet
• A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they
are legitimate
• It can be both hardware and software and they are often used together to provide stronger security
to a network
o Hardware firewalls will protect the whole network and prevent unauthorised traffic
o Software firewalls will protect the individual devices on the network, monitoring the data
going to and from each computer

Encryption
What is encryption?
• Encryption is a method of scrambling data so that unauthorised users cannot understand it
• Encryption methods use 'keys', which are specialised programs designed
to scramble or unscramble data
• Encryption uses complex mathematical algorithms to scramble the data
• There are two common methods of encryption:
o Symmetric
o Public key

Symmetric encryption
• The sender uses a key to encrypt the data before transmission
• The receiver uses the same key to decrypt the data
• It's usually faster, making it ideal for encrypting large amounts of data
• The significant downside is the challenge of securely sharing this key between the sender and
receiver
• If an unauthorised user captures the key, they can decrypt all messages intercepted in
transmission

Structure of Symmetric Encryption


Public key encryption
• Public key encryption uses two keys:
o a public key for encryption
o and a private key for decryption
• Receivers openly share their public key
• Senders use this public key to encrypt the data
43
• The receiver's private key is the only key that can decrypt the data and is kept locally on their side
• The public and private keys are created at the same time and are designed to work together in this
way
• It is typically slower than symmetric encryption
• It is generally used for more secure and smaller data transactions, e.g. passwords, bank details

Structure of Public Key Encryption

WEP/WPA
What is WEP?
• Wireless Encryption Protocol (WEP) is a method of encrypting data being transmitted on
a wireless network
• Each device on the network uses the same key to encrypt and decrypt data
• It is a less secure encryption method due to all devices on the network sharing the same key
• Eavesdropping software (packet sniffers) can be used to intercept data packets and identify the
key

What is WPA?
• Wi-fi Protected Access (WPA) is a more secure method of encrypting data being transmitted on
a wireless network
• Each device connected to the network receives a different key
• New keys are used for every packet transmitted on the network

Virtual private networks (VPN)


What is a VPN?
• A VPN allows users to remotely connect to private local area networks (LANs)
• All data sent and received using a VPN is encrypted
• Common uses of a VPN include:
o Accessing private network .
o Making secure payments using Encryption.
o Hiding web activities by hiding IP Address, Musk IP Address
o Bypassing geolocation rights management or online censorship.

File access rights


What are file access rights?
• File access rights can be set to determine different levels of access to specific files/folders
• Examples of file permissions include:
o Read - can read the contents of a file only
o Write - can make changes to file contents and/or create new files
o Delete - can delete files
o Execute - can run applications/launch software

Transaction logs & backups


What is a transaction log?
• A transaction log is a secure file on a network that keeps a record of every action performed by
devices on a network
• Transactions logs include:
o Device & data access
o Timestamps
o User IDs
o Successful/failed login attempts
• Transaction logs don't directly protect a network, they help administrators monitor any
identify any unusual activity
44
• Backups are another indirect method of protecting a network
• Keeping copies of data in a secure place on the network in the event of a data breach/loss

Worked Example
Describe one method that could be used to secure payment data transferred between a server and other
computers [3]

Answer

A description to include three linked points:

• Encryption [1] encodes/scrambles data / makes data unreadable [1] using a key [1]

Operating Online
Potential Risks to Data
Unauthorised access & accidental deletion
What is unauthorised access?
• Unauthorised access is when a user gains access to a network without permission
• Some devices are the target of hackers to be used as botnets
• Botnets are groups of computers that are used without an owners knowledge to carry out harmful
activities or spread malware

Accidental deletion
• Accidental deletion of data can occur when a user:
o Presses the wrong key on a keyboard
o Formats media on the wrong device
o Loses power unexpectedly

Malware
What is malware?
• Malware (malicious software) is the term used for any software that has been created with malicious
intent to cause harm to a computer system
• Examples of issues caused by malware include
o Files being deleted, corrupted or encrypted
o Internet connection becoming slow or unusable
o Computer crashing or shutting down
• There are various types of malware and each has slightly different issues which they cause

Malware What it Does


• A program which can replicate itself on a user's computer. It contains code that will
cause unwanted and unexpected events to occur
• Examples of issues a user may experience are
Virus o Corrupt files
o Delete data
o Prevent applications from running correctly

• Worms are very similar to viruses, with the main difference being that they will spread
Worms to other drives and computers on the network
• Worms can infect other computers from

45
o Infected websites
o Instant message services
o Email
o Network connection

• Sometimes also called a Trojan Horse


• Trojans disguise themselves as legitimate software but contain malicious code in the
Trojan
background

• Software which will allow a person to spy on the users' activities on their devices
• This form of software will be embedded into other software such as games or programs
that have been downloaded from illegitimate sources
Spyware
• Spyware can record your screen, log your keystrokes to gain access to passwords and
more

• A form of malware that locks your computer or device and encrypts your documents
and other important files
• Often a demand is made for money to receive the password that will allow the user to
Ransomware
decrypt the files
• There is no guarantee paying the ransom will result in the user getting their data back

Phishing & pharming


What is a phishing?
• Phishing is a form of social engineering
• It involves sending fraudulent, legitimate-looking emails to a large number of email addresses,
claiming to be from a reputable company or trusted source to try and gain access to your details
• Phishing often tries to coax the user to click on a login button to enter their details

What are the effects of phishing?


• The creator of the email can gain unauthorised access to personal data such as login information,
bank accounts and more
• Phishing can lead to identity theft or fraudulent activity on credit cards and bank accounts

How can phishing be prevented?


• Phishing can be prevented by:
o Anti-spam filters to avoid fraudulent emails arriving in a user's inbox
o Training staff to recognise fraudulent emails and to avoid opening attachments from
unrecognised senders
o User access levels to prevent staff from being able to open files-types such as executable
(.exe) files and batch (.bat) files

What is a pharming?
• Pharming is typing a website address into a browser and it is redirected to a 'fake' website to
trick a user into typing in sensitive information such as passwords
• An attacker attempts to alter DNS settings or change a users browser settings to redirect users to the
fraudulent website

What are the effects of pharming?


• The creator of the malicious content can gain unauthorised access to personal data such as login
information, bank accounts and more
• Pharming can lead to identity theft or fraudulent activity on credit cards and bank accounts

46
How can pharming be prevented?
• Pharming can be prevented by:
o Keeping anti-malware software up to date
o Checking URLs regularly
o Make sure the padlock icon is visible

Worked Example
Explain why phishing messages are sent to many users [2]

Answer

• It increases the chances of a user responding [1] because not all users are vulnerable / phishing
targets vulnerable users / more people are aware of phishing [1]

Methods of Securing Data


Passwords, PINs & biometrics
What is a strong password?
• Strong passwords should contain:
o More than eight characters
o A mixture of letters, numbers and symbols
o A mixture of uppercase and lowercase letters
o Uncommon words/phrases
• Passwords should be changed regularly

What are biometrics?


• Biometrics are a way of authenticating a user by using their unique human characteristics
• Some of the ways biometrics can be used are:
o Fingerprint scans
o Retina scans
o Facial recognition

Advantages Disadvantages
• Unique to the person and can not be copied,
• can be intrusive, for example, scanning
meaning that the data is always with the
eyes
person
• Scans be not be recognised, an example of
• Passwords can be easily copied, forgotten,
could be fingerprint scans with dirty hands
guessed or cracked
• Very expensive to install
• It is difficult to copy or forge biometric data
• Low light can provide an issue for facial
• Eliminates the possibility of attacks such as
recognition as well as hats and glasses
shoulder surfing and key-logging software
• People may be uncomfortable having their
• A high degree of accuracy as there is no
most unique characteristics being stored in
known way to copy a person's retina pattern
a database
for example

What is a CAPCHA?
• A CAPCHA is a method of testing if a website request originates from a human or
a machine (bot)
47
• Completely Automated Public Turing test to tell Computers & Humans Apart (CAPTCHA)
examples include:
o Text - Asking users to enter characters from a distorted text box, users would need to
decipher the characters and enter them in a designated box
o Image - A grid of images, a user would be asked to select all those that contain a specific
object
o Checkbox - A simple checkbox appears asking the user to confirm they are not a robot
• A CAPTCHA can be used to prevent spam and protect logins

Anti-malware
What is anti-malware software?
• Anti-malware software is a term used to describe a combination of different software to prevent
computers from being susceptible to viruses and other malicious software
• The different software anti-malware includes are
o Anti-virus
o Anti-spam
o Anti-spyware

How does anti-malware work?


• Anti-malware scans through email attachments, websites and downloaded files to search for issues
• Anti-malware software has a list of known malware signatures to block immediately if they try to
access your device in any way
• Anti-malware will also perform checks for updates to ensure the database of known issues is up to
date

Access rights
What are access rights?
• Access rights ensure users of a network can access what they need to access and do not have access
to information/resources they shouldn't
• Users can have designated roles on a network
• Access rights can be set based on a user's role, responsibility, or clearance level
o Full access - this allows the user to open, create, edit & delete files
o Read-only access - this only allows the user to open files without editing or deleting
o No access - this hides the file from the user
• Some examples of different rights of access to a school network could include:
o Administrators: Unrestricted - Can access all areas of the network
o Teaching Staff: Partially restricted - Can access all student data but cannot access other staff
members' data
o Students: Restricted - Can only access their own data and files
• Users and groups of users can be given specific file permissions

Secure websites
What is HTTP & HTTPS?
• Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for website
viewing
• HTTP allows clients to receive data from the sever (fetching
a webpage) and send data to the server (submitting a form,
uploading a file)
• HTTPS works in the same way as HTTP but with an added
layer of security
• All data sent and received using HTTPS is encrypted
• HTTPS is used to protect sensitive information such as
passwords, financial information and personal data
48
Email safety
What is email safety?
• Users should be aware of the dangers when using email, especially email attachments and web
links
• To ensure users use email safely they should take extra caution when:
o Email is from an unknown sender
o Text is general or impersonal
o Contains spelling, punctuation or grammar mistakes
o Attached files are executable files (.exe)
o Urgency is the tone of the message
o Don't recognise the URL

Backup procedures
What is a backup software?
• Backup software is used to create copies of personal data in order to keep it safe in the event of:
o Accidental loss
o Data theft
• Backups can be automated and scheduled to happen at less busy periods of the day, to not take up
valuable system resources (e.g. overnight etc.)
• Backups can be made in two ways:
o Full - all files are backed up (saftest, slow)
o Incremental - only files that have been added/modified since the last backup are backed up
(faster, less secure)
• Backups can be stored locally (secondary storage) or remotely (cloud)
• Backup software can be purchased or come as a standalone application bundled with an operating
system

Online Payment Systems


What are online payment systems?
• Online payment systems eliminate the need for physical cash by facilitating the payment of good
and services online
• Online payment systems offer:
o Convenience - pay for anything, anytime, from anywhere
o Security - encryption protects sensitive information
o Increased reach - can be used for international transactions
o Transparency - digital records kept for easy monitoring and resolving disputes
• The most common online payment systems include:
o Third party payment processors
o Bank cards
o Contactless (NFC)

Third party payment processors


• Third party payment processors facilitate online payments using an email address as identification
• They can be linked to online shopping applications to make the purchasing process easier & faster
• Popular third party payment processors include:
o PayPal
o Worldpay
o Stripe

49
Bank cards
• A bank card can be used to pay for good and services online using information found on the card
• When making a purchases, the following information is required:
o 16 digit card number
o Expiry date
o Security number (CVC)
• When choosing to use a bank card online, other financial institutions may be used
to authenticate the transaction, such as:
o Visa
o Mastercard

Contactless payments (NFC)


• Contactless payments can be made using near field communication (NFC)
• If a contactless card is in close proximity of a reader requesting a payment then a transaction can
take place
• No extra authentication takes place, but the amount is limited
• Limits are there to deter criminals as only small amounts can be stolen

How can you protect online payments?


• Online payment systems can be protected using a number of methods such as:
o Banks - monitoring payments and/or analysing spending patterns (if card is
lost/stolen/cloned)
o Encryption for online payments
o Two factor authentication (2FA)
o Using secure websites (HTTPS)

Worked Example
David buys a coffee in a store.

David pays with a card using NFC.

Explain why NFC speeds up the payment process. [2]

Answer

• Users can scan/tap their card / do not have to insert their card / do not have to enter their
PIN/code [1]...
• ...because NFC is a contactless payment method [1]

Impact of the Internet on individuals

Employment
What are the impacts of the internet on employment?
• The three biggest impacts of the internet on employment are:
o change in skills requirements
o new job opportunities
o job losses
50
Skills requirements
• The demand for tech skills and competence in information communication technology (ICT)
• The ability to work with and analyse more data to make informed business decisions
• A shift in the need for particular skill sets due to more automation means potential employees
need to be adaptable
• A focus on problem solving and critical thinking rather than carrying out tasks that can now be
automated
• An increased importance on soft skills such as:
o Effective communication
o Collaboration
o Lifelong learning

New job opportunities


Job Description
• Skilled works to look after and protect systems from
attack
Cyber security • Trained to work with computer systems and
networks

• Experts to analyse data and extract insights


Data science • Programming knowledge

• Developing AI in all industries


Artificial intelligence (AI) & machine learning
• Working with machine learning algorithms
(ML)

• Content creation
• Search engine optimisation (SEO)
Digital marketing
• Social media marketing

• Cloud architects
Cloud computing • Security specialists

Job losses
• Employees who choose to not improve their skills using the internet may unfortunately not have
the skills required to carry out new work
• If they are unwilling to retrain this may lead to job losses

Impact of the internet on working practices


What are working practices?
• Working practices are the ways in which a person goes about completing a task as part of their job
• Examples of working practices include:
o Collaborative working
o Flexible working

Collaborative working
• Collaborative working means employees can work on the same project or task at the same time,
in real time
• The internet enables employees to work together remotely, bridging the gap of being in the same
place at the same time
• This allows employers to choose employees from a much wider talent pool

51
Advantages Disadvantages
Co-ordination - organising meetings and keeping
Efficiency - tasks can be completed more quickly
people on the same page can be hard
Personality clashes - some people do not work
Knowledge - shared skills and experience
well in a team and can hinder progress
Creativity - access to other perspectives, problem Contribution - some members might not
solving as a team contribute equally

Morale - motivate employees by building a team spirit


Flexible working
• Flexible working means employees can work when suits them
• They can decide the hours they work or work from home
• The internet also makes working on the move an option for employees

Advantages Disadvantages
Work life balance - can schedule work around Communication - lack of face to face can hinder
personal commitments collaboration
Productivity - working when YOU feel the most Isolation - missing social aspects of traditional office
productive environment
Fewer sick days - better work life balance leads to Management - supervising and monitoring employees
fewer absences can be more difficult
Worked Example
Sarah uses the Internet for work.

Sarah can collaborate with others so expertise can be shared.

Explain one other way that the Internet could positively impact how Sarah works [2]

Answer

Impact:

• more productive / doesn’t waste time [1]


• better motivated [1]
• more flexibility [1]
• better work life balance [1]

Reason:

• work at home / on the move [1]


• access online files/information/resources/software [1]

Access to Information
Does the internet give access to more information?
• Yes, the internet gives access to a wealth of information
• Individuals can keep up to date with news, sport and weather information 24 hours a day
• Traditional media such as television and radio have some disadvantages that the internet has solved

52
Television and radio Internet
Broadcast at set times 24/7 availability
Limited number of channels Millions of channels
Editors decide on content Not always edited
Only available within range of transmitter Access from anywhere with a connection

Limited access to news from other countries More open access, some content is geo-restricted
Held to standard Not always held to any standards
New ways of learning
• The internet has given people access to new ways of learning, such as:
o Virtual learning environments (VLEs) - online support from teachers and students
o Social learning - social media platforms enable learners to share resources, ideas and
projects
o Gamification - making learning engaging and interaction, promoting knowledge retention
o Virtual reality (VR) - immersive experiences, bringing abstract concepts to life

Entertainment & leisure


• The internet has provided users with access to on-demand services such as streaming:
o movies
o television
o music
• Users can access online systems for:
o Travel
o Shopping
o Banking
• Individual users can create webpages and share information around the world, both for
entertainment and more serious issues

Social Impacts
Social interaction & cyberbullying
What is social interaction?
• Social communication is communication with and reaction to others
• Humans are naturally social and the internet has given users different ways to participate socially
• Examples include:
o Online gaming
o Video
o Instant messaging
o Social networking
o Online space for work & learning
• There are arguments for and against online social interaction, these are outlined below

For Against
Connection & community - connect with people with Misinformation - algorithms can limit exposure to
the same interests, regardless of location diverse perspectives and help spread misinformation
Privacy - sharing information online can lead to
Expression - platforms give a space to explore yourself
privacy concerns, where is the data kept and who
freely, find communities that can support
has access

53
Social support & mental health - give people a sense of
Distraction - online notifications can be a
belonging and support, important for people who feel
distraction, hindering productivity
isolated or struggle with mental health
Convenience - no travelling or scheduling, can take
Addiction - too much interaction can be addictive
place 24/7
Social comparisons - can lead to low self esteem
Social change - powerful tools for social activism and
and poor mental health as constantly comparing
raising awareness about important issues
yourself to others
What is cyberbullying?
• Cyberbullying is using the internet to send text, images or multimedia in order to upset or
embarrass someone
• Online bullying can range from:
o Hurtful messages
o Distributing upsetting images
o Preventing participation in online events/discussions (isolating)
• Cyberbullies can feel protected by the apparent anonymity of the internet, however most online
communication is easily monitored
• Cyberbullying can spread very quickly and to more people

Reduced physical activity


Why is reduced physical activity a concern?
• Reduced physical activity is a concern as people have more access to online goods and services and
do not need to leave the comfort of their houses
• This can lead to negative effects on people's:
o Health
o Wellbeing

Health Wellbeing
Increased risk of chronic diseases Increased anxiety and depression
Musculoskeletal problems Lower energy levels
Weakened immune system Poor sleep quality
Metabolic issues Lower self esteem
Increased blood pressure Decreased social interaction

Online Working from Home


Availability of digital devices
How has the availability of digital devices changed the way people work?
• Traditionally, workers required access to computer systems and would access them from an office
environment (centralised)
• To facilitate access, office hours such as 09:00 to 17:00 were common
• As digital devices became cheaper and more powerful, these devices were increasingly used at
home
• Digital devices can be used to:
o Run a range of software
o Access the internet
o Access online systems & applications
• This has led to opportunities for people to work from home
• This is a decentralised approach

54
• Using the internet to work from home has benefits and drawbacks for organisations and
its employees

Benefits and drawbacks to organisations


Benefits Drawbacks
Can attract talented, motivated workforce Concerns about data security
Can employee from a wider location
More difficult to manage and support employees
(internationally)
No need to buy/rent office space Employees might not work as hard
Complications with payroll for workers in different
No commuting for employees (no lateness)
coutries
Workers may work more effectively from home
Benefits and drawbacks to employees
Benefits Drawbacks
No travel to work (less stress, saves money etc.) Distractions at home (family, leisure activities)
More time working/resting, no travelling Lack of social interaction
Work at a time to suit them Feel disconnected from the company
Less distractions
Comfortable environment
Organise work around social or family commitments
No uniform/business clothes (saves money)
Worked Example
Kevin uses the Internet to work from home.

Kevin does not have to waste time travelling to work.

Describe one other positive impact the Internet has on how Kevin works [2]

Answer

A description such as:

The Internet is always available [1] so he can work at times suitable to him [1]

OR

He can collaborate with others [1] to share expertise / reduce the time to complete a task / share
workload [1]

OR

He can access a wider range of sources [1] allowing him to make better decisions [1]

Impact of the Internet on Organisations


55
Positive impact of the Internet on
organisations
What are the positive impacts of the internet on organisations?
• The positive impacts of the internet on organisations are:
o Improved communication
o Access to global markets
o Access to global workforce
o How information is managed and used

Improved communication
• The internet has made it possible for organisations to communicate with its customers easily and in
real time
• Examples of how organisations can communicate with its customers include:
o Websites
o Email
o Instant messaging
o Social media

Access to global markets


• The internet means organisations can advertise and sell to customers in countries around the
world
• Organisations have easier access to manufacturers and can communicate more efficiently with
them
• They can sell products online and reduce costs on:
o Overheads (rent, utilities and staff)
o Packaging
o Postal charges

Access to global workforce


• With the internet, organisations can now find and hire the best talent for the job, regardless of
location
• Organisations can be more selective, they are not limited to employees within travelling distance of
a place of work
• They can select employees from different time zones and utilise different skills
• Organisations may be able to reduce costs, for example, wages in some countries may be lower

How information is managed and used


• Organisations use big data collected from smartphones, online applications, social media and
payments systems to find patterns of behaviour
• This allows organisations to improve the customer experience and improve process efficiency

Negative impact of the Internet on


organisations
What are the negative impacts of the internet on organisations?
• The negative impacts of the internet on organisations are:
o Security issues
o Greater competition

Security issues
• Many organisations store private and valuable data that needs to kept secure
• Traditionally, data would be kept in a secure central location using physical safety measures such
as:

56
o Walls
o Locks
o Alarms
o Security guards
• The internet now means employees are able to access secure data working remotely
• Typically this is achieved in three ways:
o VPN (link here) - remotely access organisations data on servers
o Transfer a copy of organisations data to home via external storage or email
o Storing organisations data on someone else's server (cloud)
• Data being accessed remotely means it is more vulnerable to threats such as:

Threat Prevention
Employees revealing login details Policies to ensure employees are accountable for
intentionally/accidentally their actions
Unauthorised users intercepting data being transferred
Encryption
on the internet
Unauthorised users hack in to the organisations systems Firewalls/authentication
Greater competition
• The internet means organisations have greater competition for products and services
• Traditionally, organisations were only in competition with other organisations in their local area or
country
• The internet means consumers can buy from organisations globally, this extra competition can drive
down prices
• Some organisations and entire industries have been put at risk because of this, some examples
include:

Industry/service Risk
Music/film rental Online downloads & streaming
Record labels Independent artists can release their own music online
Estate agents Online advertising/virtual viewings
Newspaper publishers Online news and information services
Postal services Send messages and digital media instantly
Worked Example
Describe two positive impacts of the Internet on organisations [4]

Answer

Two descriptions such as:

• Improved communication/collaboration [1] through the use of email/messaging services / hosted


applications/storage [1]
• Increased access to international markets/workforce [1] due to the global reach of the web /
opportunities for more flexible working [1]
• Improvements in access to customer information [1] through analysis of big data [1]
• Make use of transactional data [1] to carry out targeted marketing [1]
• Maintains workforce productivity [1] if workforce is unable to attend the workplace [1]

Impact of the Internet on Society


57
Less-restricted networks
What is the impact of less-restricted networks?
• The impact of less-restricted networks is evident in mass communication (media) such as:
o Broadcastings
o Publishing
o The internet

Impact Impacts
• Before the internet, an individual would need to persuade a media outlet to
broadcast their message
Broadcasting a • It was difficult to get a message to the masses
message • Social media and video streaming have given society a platform to share their
own messages to a global audience

• Controlled by moderators
• Service owners control content can be published
• Algorithms determine what content watchers see based upon browsing history
Online content
& online activity
• Paid promotion will be seen by more users than individuals that don't pay

• Sites such as Wikipedia have removed the element of fact checking by


User generated experts or editors
reference sites • Users can contribute content that may or may not be true

Negative

• Use of social media and video messaging services to organise illegal activities
whilst avoiding police

Law enforcement Positive

• Use of a network of CCTV cameras to record illegal actions


• Footage captured on social media to help identify suspects
• Social media used to organise events to support victims

Information rich & information poor


What is the information gap?
• The information gap refers to the divide created between people who have access to online
information, and those that do not

Information rich Information poor


Good access to information, this improves education Reduced access to information, this decreases
and helps enable them to make decisions education and reduces their ability to make decisions
• The gap has been there since television and radio were introduced
• The internet has further widened the gap

Access to Digital Technology

58
Unequal access & socialising
What is the digital divide?
• The digital divide is the gap between people who have access to digital devices and the
internet and people who do not
• Factors that affect people's access include:

Factor Description
• Countries with a strong economy can invest in infrastructure that provides access to
networks and the internet
Economy &
• Countries with emerging and developing economies may prioritise other needs
infrastructure
(food, healthcare etc.)

• People who live in remote locations where wireless signals and/or cabling is
Location unavailable to reach

• Government control over access to information


• Not allowing access to certain websites or content from other countries
Politics • Blocked access to satellites to stop television/radio broadcasts due to cultural
influences

• Some religions block access to technology


Religion
• Some digital devices are not inclusive
Disability
• Age
• Gender
Social • Education
• Income

Changes in ways of socialising


• Traditional methods of socialising, meeting in person and talking, have been replaced with an
increased use of digital devices
• The internet allows people to connect with other people around the world
• The use of digital devices can lead to isolation and anxiety around meeting people in real life

Online Communities
What is an online community?
• An online community is a group of people with a shared common interest who communicate
online
• Every online community has:
o a function - what it does for people who use it
o features - what enables it to function

Social networking
What is social networking?
• Social networking is the practice of forming groups in society
• The internet has made it possible it possible to do this online

59
What is the function of social networking communities?
• The function of social networking communities is to allow users to connect through shared
interests or relationships
• Traditionally, they were separated in to personal and professional communities
• Personal communities included examples such as:
o Facebook
o Twitter (X)
• Professional communities included examples such as:
o LinkedIn

Features of social networking communities


Feature Description
• A collection of information about a person
Profiles
• Ability to add friends to your network
Friends, follow and • Can be followed to keep up to date with events
connect • Profiles can be limited for certain friends/groups

• Messages from friends and groups appear here


Stream, wall and • Usually the first thing a user sees when logged in
timeline • Chronologically ordered

• Users can write messages to friends, groups or to everyone


• Messages appear on their stream
• Messages can be directed at groups of users
Status updates and posts
• Content of status updates is stored by social network providers and can
be used for targeted advertising

• Users can belong to specific groups created for common interests or


likes
Groups, lists and circles
• Members can be added/removed

• Allows content to be categorised


Tags • Users can search for tags to find content

• Users with similar interests or shared personal/professional experiences


User suggestions can be suggested for users to connect with

• Users can rate content


• Letting other users know what they like or find funny
Reactions, ratings, likes,
• Users can also downvote content
upvotes and downvotes
• Feedback can feed in to targeted advertising

• Users can share other peoples posts/comment


• Opening users comments/posts to a wider audience can lead to them
Share
going viral

• Allows users to mention specific posts/comments in their messages


Comments and quotes • Can start a dialogue between users

60
• Allows users to easily share content across other platforms (Facebook &
Third-party integration Instagram for example)

• Tells users about new activities


Notifications • Keeps users up to date

• Allows users to be able to send private messages directly to other users


Private or direct
without posting publicly
messages
Online gaming
What is online gaming?
• Online gaming is when video games are played over the internet or computer network
• Examples include:
o Xbox Live
o PlayStation Network
o Steam

What is the function of online gaming?


• The function of online gaming is to allow users to play multiplayer games together

Features of online gaming


Feature Description
• Share gaming experience and connect with friends
Links to social media
• Personalise online identity and showcase achievements
Users profiles
• In-game tutorials and guides to completing games
How-to's

• Rewards for in-game achievements to motivate users to continue to play


Experience points/trophies

• Somewhere for users to share tips, tricks and general game talk
Discussion boards/forums

• Keep you informed about updates, friend activity and events


Notifications

Online work spaces


What is an online work space?
• Online work spaces are virtual platforms that bring remote teams and projects together
• Examples of online work spaces include:
o Slack
o SharePoint
o Adobe Connect

What is the function of online work spaces?


• The function of online work spaces is to give users a platform to be able to collaborate together for
the purposes of work

Features of online work spaces


Feature Description

61
• Provides access to data to all users
Cloud storage
• Users can provide feedback directly in documents and tasks
Commenting
• Quick and easy communication between users
Messaging system
• Allows users to see availability of other users and for scheduling
Shared calendars
• Central location to find and connect with users
Contacts list
• Real-time discussion spaces for specific topics or projects
Chat rooms
Virtual meeting • Conduct video conferences and presentations online
spaces
Virtual learning environments (VLE)
What is a VLE?
• A VLE is an online platform for education and training
• Examples of online work spaces include:
o Google Classroom
o Microsoft Teams
o Moodle

What is the function of a VLE?


• The function of a VLE is give teachers and students a shared platform to use learning and
assessment features

Features of a VLE
Feature Description
• Allows teachers/students to keep up to date with latest posts/events
Wall or timeline
• Allows teachers to give announcements to students or classes
Notice boards
• Allows users to share audio, video, web links or files
Multimedia sharing
Quizzes or multiple • Self marking tests that are graded automatically
choice tests
• Moderated by a teacher
Communication tools
• Linked to a school or colleges management system to auto enrol
Log-in system students/teachers

• Allow teachers and students to monitor progress through a course


Gradebooks

User-generated reference sites


What is a user-generated reference site?
• A user-generated reference site is an information websites created & maintained by communities
of users
• Examples of user-generated reference sites include:
o Wikis

62
o Forums

What is the function of a wiki?


• The function of a wiki is to allow users to contribute to a community website or database
• Wiki users collaborate in order to build and edit web pages

Features of a wiki
Feature Description
• Allow users to track edits
User accounts • Track who has made edits

• Gives users an editor to make changes to add new content


Editor
• Allows users to quickly and easily search for content
Search tools
What is the function of a forum?
• The function of a forum is to provide its users with online space for structured discussions

Features of a forum
Feature Description
• Manage discussions and enforce rules to keep order
Moderators
• In control of the entire forum
• Manage users
Administrators
• Introduce new features

• Users messages that contribute to a thread


Posts
• A collection of posts about a specific topic
Threads
• Users can express opinions on the value or helpfulness of a post
Ratings
• Automatically removes content that violates the forum's rules or is inappropriate
Censoring
Reports & • Allows users to notify moderators about problematic content
flags
User-generated content
What is user-generated content?
• User-generated content is made by users of sites and services and available online
• Examples of user-generated content include:
o Video & photo sharing sites
o Blogs & vlogs

What is the function of video & photo sharing sites?


• The function of video & photo sharing sites is to allow users to access and share content created
by each other
• Creating a sense of community

Features of video & photo sharing sites


Feature Description

63
• Allows users to register, upload and manage content
User accounts
• Provides tools for uploading, organising, editing and sharing content
Content management system
• Allows users to add keywords to help categorise and discover content
Tags
• Allows users to express opinions on content
Ratings
• Allows users to leave messages directly on content
Comments
• Connects with other social media platforms for wider sharing
Third party integration
Social bookmarking
What is social bookmarking?
• Social booking sites give users a platform to categorise and share web documents and URLs
• Examples of social bookmarking sites include:
o Pinterest
o Reddit

What is the function of social bookmarking sites?


• The function of social bookmarking is to share web documents and URLs

Features of social bookmarking sites


Feature Description
• Allows users to register, upload and manage documents and URLs
User accounts
• Connects with other social media platforms for wider sharing
Third party integration
• Allows users to categorise content
Tags
• Allows users to connect with each other
Social network features

Implications of Digital Technology


Laws Impacts Digital Technology
Data protection
What is the Data Protection Act?
• The Data Protection Act (DPA) is a law that protects personal data from being misused
• Examples of personal data would include
o Name
o Address
o Date of Birth
o Race
o Religion
• Most people that store personal data has to follow the Data Protection Principles although there are
a few exemptions:
o Domestic purposes – if you only use personal data for such things as writing to friends and
family or taking pictures for your own enjoyment, you are not subject to the DPA
64
o Law enforcement – the Police investigating a crime is not subject to the DPA. E.g. if
someone has been suspected of a crime they can't request to see the evidence about them
o Intelligence services processing – personal data processed by the intelligence services (e.g.
MI5) is not covered by the DPA

The data protection principles


Principle How does it affect a company? Example
1. Personal data must A company has to be clear about what A school can request personal data to
be fairly and lawfully personal data they wish to collect and be able to call guardians in an
processed what they want to use it for emergency
2. Personal data must A company cannot use personal data for
A company asks for a phone number
be collected for any purpose other than what they stated
to call regarding delivery but then uses
specified and lawful originally. They also cannot pass this
it to market new products
purposes data on without permission
3. Personal data must A bank cannot ask for their customer's
A company cannot request personal data
be adequate, relevant previous trips when opening an
that they do not need right away
and not excessive account
4. Personal data must If a company holds personal data that is If a bank has a customer's old address
be kept accurate and up wrong or out of date then you have a then they will not be able to send up to
to date right to have it corrected or deleted date statements
5. Personal data will not
A company must delete personal data If a customer closes their account the
be kept for longer than
once they no longer have a need for it company must delete their data
is necessary
6. Personal data must If requested a company must provide a
A hospital has to give a patient’s full
be processed in line customer with all the personal data they
records if requested by the patient
with people's rights hold on them
Copyright
What is copyright?
• Copyright is covered under a law called the Copyright Designs & Patents Act
• This protects the intellectual property of an individual or a company
• It makes it illegal to copy, modify or distribute software or other intellectual property without the
relevant permission
• If original work is original, copyright will be automatically applied and will not expire until 25 - 70
years from the death of the creator depending on the type of work
• If an individual believes that their work has been copied it is their responsibility to take action under
the Copyright Designs and Patents Act
• Many sites online offer free downloads of copyrighted software/videos which prevents the
intellectual copyright holder from earning their income on the work they have created
o E.g. If someone downloaded videos from Netflix and shared them with others, they would be
breaching the act
• The act covers videos and audio where peer-to-peer streaming prevents a copyright owner from
receiving an income

What is prohibited under the Copyright, Designs & Patents Act?


Primary breaches:
• Copying an original work
• Issuing a copy of the original work to the public
• Renting/lending a copy of the original work to the public
• Performing, showing or playing the original work in public
• Making an adaptation of the original work

65
Secondary breaches:
• Importing a copy of the original work
• Possessing or dealing with a copy of the original work
• Providing means to make copies of the original work
• Permitting the use of premises for making copies of the original work
• Provision of props/equipment for a performance of a copy of the original work

Software piracy
• Software piracy is the illegal copying and distribution of software
• Companies often take a lot of steps to prevent software piracy, some of these methods include:
o Product key / license: Often a unique string or letters and numbers supplied with the
software to activate it
o Agreement of terms and conditions: Users will be asked to click to agree to the license
agreement before being able to install the software
o Holograms: Holograms are often used on the packaging of software and they indicate that
the copy is genuine as they are too difficult and costly for pirates to implement
o Some older software would only run if the CD ROM or memory stick was physically in the
device using it

Are there any copyright exemptions?


• Some countries have exemptions to the copyright law
• In the UK for example, they have fair use
• Examples of fair use include:
o Uses for the benefit of people with a disability
o Non-commercial research or private study
o Recordings of broadcasts for archiving
o Copies of books/documents made by a library, educational establishment, museums or
archives
o When used in a parody

Monitoring individuals
How can individuals be monitored?
• Digital technology can be used to monitor individuals but it is a controversial subject
• Examples of how individuals can be monitored include:
o Closed circuit television (CCTV)
o Automatic number plate recognition (ANPR)
o Physical forms of identification (passports, bank cards, drivers licence etc.)
o Network activity (IP/MAC addresses)
o GPS data shared by apps
o GPS trackers
• Individuals communication can also be monitored
o Parental control software to monitor children's online activity
o Social media
o Web histories
• In the UK, the Investigatory Powers Act (2016) allows the police to access these kinds of digital
communications

Benefits & drawbacks


Benefits Drawbacks
Finding people who are lost Compromising peoples privacy
Expense of setting up, monitoring and
Identify people on a network
maintaining

66
Locate friends for social activities Energy consumption
Identify & locate potential criminals at events Making the public not feel trusted
Keeping travellers safe by monitoring events at airports/train
stations
Verifying individuals for financial transactions to reduce financial
crime

Health & Safety


Health & safety
What are health issues?
• Health issues are a common side affect of the prolonged use of IT at home or in the workplace
• There are strategies that should be in place to help prevent health issues such as:
o Repetitive strain injury (RSI)
o Back/neck problems
o Eye strain
o Headaches

Risk Cause Prevention


• Have the correct posture (angle of arms
• Damage to the fingers, wrists and
to the keyboard and mouse)
Repetitive joints, traditionally cause d by
• Use a wrist support if necessary
strain injury prolonged use of a keyboard and
• Take regular breaks
(RSI) mouse
• Make use of ergonomic keyboards

• Sitting in front of a computer • Use adjustable chairs


Back/neck screen for prolonged periods of • Take regular breaks
problems time • Use a foot rest

• Staring at a computer screen for


• Take regular breaks
prolonged periods of time or
• Use anti-glare screen filter
Eye strain incorrect lighting causing
• Change from CRT to LCD monitor
reflections

• A combination of factors,
including:
• Take regular breaks
o Poor lighting
• Have regular eye tests
Headaches o Flickering screens
• Use an anti-glare screen filter
o Reflections
o Fatigue

What is physical safety?


• Physical safety is creating a safe environment when using technology
• It includes considering dangers that could lead to serious injury or loss of life
• Identifying strategies to mitigate dangers
• Safety risks include:
o Electrocution from spilling drinks near electrical equipment
o Fire hazard from overloading plug sockets
o Equipment overheating
o Trailing cables (trip hazard)
o Heavy equipment falling and causing injury
67
Risk Cause Prevention
• Spilling drinks
near electrical • Keep liquids away from electrical equipment
equipment

• Ensure that cables are properly insulated and protected


Electrocution
• Use non-conductive materials where possible
• Touching live
• Ensure that electrical equipment is turned
cables
off and unplugged before cleaning or maintenance
• Use circuit breakers or fuses to prevent electrical overload

• Use surge protectors to prevent electrical overload


• Sockets being • Ensure enough plug sockets in the room
overloaded • Don’t plug too many devices into the same plug socket
• Don’t leave devices plugged in and unattended

• Ensure that equipment is properly ventilated and not


Fire hazards obstructed
• Keep flammable materials away from heat sources
• Equipment
• Regularly check equipment for signs of wear or damage
overheating
• Use fire extinguishers in case of emergencies
• Turn off or unplug devices when away from the location
• Do not cover any air vents on devices

• Use cable ties or clips to secure cables


• Keep cables away from areas where people are walking
• Secure cables where you can, like under desks to stop
• Cables not
protruding into open areas
properly secured
Trip hazards • Use cable covers to protect cables and prevent tripping
or organised
hazards
• Regularly inspect cables for signs of wear or damage
• Where possible use wireless devices to reduce cables

• Ensure that equipment is properly secured and stable


Improperly secured • Regularly check the stability of locations containing
equipment devices
Personal
• Keep equipment away from edges and other potential
safety
hazards
Equipment not placed on
• Regularly inspect equipment and locations containing
stable surfaces
devices for signs of wear or damage

Worked Example
Not having uncovered drinks near a laptop is one method of reducing the risk of electric shock.

Identify two other health and safety risks of using ICT and one method of prevention for each risk. [4]

Answer

Eye strain [1]

• Take regular breaks [1]


68
• Set lighting levels [1]
• Anti-glare screen [1]
• Use blue light filter [1]
• Sit at an appropriate distance from the screen [1]
• Use larger screen [1]

Trip hazards [1]

• Use wireless technology [1]


• Use cable ties Run cables under carpet [1]
• Organise cables [1]

Fire [1]

• Do not overload sockets [1]


• Have electric devices checked regularly [1]

RSI
Back/shoulder/wrist pain
Carpel Tunnel syndrome [1]

• Position keyboard appropriately [1]


• Use ergonomically designed seating/furniture [1]
• Use ergonomically designed devices [1]
• Take breaks [1]
• Use correct posture [1]

Online Safety
Online safety
What is the need for online safety?
• Online safety is about knowing about and using the internet safely and responsibly
• It refers to when an individual is using the internet, email, social media, online gaming
• Online safety refers to the individual knowing how to protect themselves from potential dangers
and threats

Need Description
Protects personal
Awareness that personal information should not be shared freely
information
Awareness of how to act online and how to avoid falling victim, creating a safe
Prevents cyberbullying
and respectful online environment
Guards against online Identify and avoid online scams, phishing attempts, and fraudulent websites that
scams may try to trick them into sharing personal or financial information
Ensures digital Mindful of online behaviour and interactions, protecting your digital reputation,
reputation which can have long-term consequences in personal and professional lives
Promotes privacy and Have control over privacy settings on social media platforms, allowing a limit to
control who can access/view personal information and posts
Prevents exposure to Avoid encountering explicit or harmful content online, reducing the risk of
inappropriate content exposure to inappropriate material or online predators
Secures online gaming Engage in online gaming responsibly, avoiding sharing personal details and
experiences maintaining respectful behaviour towards other players

69
Guards against Protecting devices from malware, viruses, and other online threats, preventing data
malware and viruses loss, privacy breaches, or device damage
Promotes responsible Develop responsible online behaviours, promoting respectful conduct while
digital citizenship interacting with others on the internet
Maintain a healthy balance between online and offline lives, reducing the risk of
Supports overall well-
addiction, mental health issues, or negative impacts on relationships and self-
being
esteem
How can you be safe using IT?
• There are many ways to remain safe when using technology, by following the advice and
guidance users can stay safe whilst:
o Using the internet
o Sending/receiving email
o Using social media
o Playing games online

Task Advice & guidance


• Use trusted websites recommended by teachers or reputable sources
• Utilise search engines that only allow access to age-appropriate websites and
Using the
use filters to ensure inappropriate content is not seen
internet
• Never reveal personal information

• Be aware of the potential


dangers of opening or replying to emails from unknown people,
including attachments, potential dangers include phishing, spam
Sending/receiving
• Ensure you know who the email is for when considering sending personal
email
data or images via email, only with people you know and not with identifiable
content like school photos

• Know how to block and report people who send content or messages that
are unwanted
• Know where the privacy settings are to reduce the number of people who can
see your posts or images
• Be aware of the potential dangers associated with meeting online contacts face to
face, do not meet anyone you do not know, if you do, take an adult and meet
Using social publicly
media • Do not distribute of inappropriate images and inappropriate language
• Respect the confidentiality of personal data belonging to other people
• Only accept friend requests from people you know
• Parents should be aware of what you are doing online, discuss what you are
doing online
• Do not post images or details that can be used to locate you

• Do not use real names as usernames


• Never share personal or financial details with other players
Playing games
• Know how to block and report players for inappropriate messages or
online
comments

Acceptable behaviour policies


What is an acceptable behaviour policy?
• An acceptable behaviour policy (ABP) is a set of rules that outlines how people are expected to
conduct themselves online
• ABPs are used in all forms of online community and typically covers:
70
o Desired behaviours
o Unacceptable behaviours
o Reporting procedures
o Consequences

Environmental Impact of Digital


Technology
Environmental impact of digital technology
What are the environmental impacts of digital technology?
• The environmental impacts of digital technology can be categorised in to four key areas:
o Carbon footprint
o E-waste
o Resource consumption
o Energy use

Category Description
• The production of, using of and disposing of digital technology adds to
Carbon footprint greenhouse gas emissions

• A throw-away society generates a growing amount of e-waste


• It often ends up in landfills in less developed countries, leading to health and
E-waste
pollution hazards

• Rare materials and resources being consumed during the manufacturing of digital
Resource
devices
consumption
• Increased use of data centres and the number of digital devices in the home
Energy use adding extra strain to power grids

Sustainability
• Energy use is a big factor in the sustainability issues caused by the use of digital devices

Cause Issue Mitigation


Digital devices at • Using renewable energies
Power is produced using non-
home and in the • Using more energy efficient devices
renewable energies
office
• Geolocation of data centres in colder
Requires extensive cooling climates
Data centres which is generated by non- • Near rivers to to use of natural hydro-electric
renewable energies power

• Recycling
• Education
Poisonous substances used in
Natural resources • Laws
digital devices
• Harmless alternatives

Worked Example
Explain one benefit to the environment of buying previously-owned devices [2]

71
Answer

Examples could include:

• It is more sustainable [1] because fewer precious metals used/required/mined [1]


• Reduces/mitigates the impact on the food chain [1] because fewer waste materials leak into the
ground/water supply/food chain [1]
• The need to mine more is delayed [1] because precious metals are reused [1]
• Non-renewable resources like oil are not depleted [1] because less plastic is used [1]

Sources of Information
What is a primary & secondary source?
• A primary source is is a source that you have created yourself
• A secondary source is a source that has been created by someone else
• Examples of primary and secondary sources include:

Primary sources (your own) Secondary sources


Sound recordings Newspapers
Photographs Books
Interviews/questionnaires Television & radio broadcasts
Social media posts Websites
Emails CDs, DVDs or Blu-rays
• To select the most appropriate source of information, you must consider:
o It's fitness for purpose
o It's fitness for the intended audience

Using search engines effectively


What are search engines?
• Search engines are tools that locate and display web pages related to the search terms entered by
the user
• They are essential for navigating the vast amount of information on the internet
• They index millions of web pages and use algorithms to rank the relevance of each page to the
search terms

How do search engines work?


• Search engines work in three stages:
o Crawling
o Indexing
o Ranking

• Crawling is when web crawlers scour the internet daily to retrieve new websites
• Indexing is how websites are categorised based on the content of their web pages, keywords and
metadata
• Ranking is how websites are ranked and listed on search engine pages - this depends on many
factors to display the most relevant results

How can you use search engines effectively?


• To use a search engine effectively you can make use of features such as:
o Keywords
o Search types
o Search tools
72
o Suggested sites & autofill
o Search syntax

Feature Description
• Used to identify relevant information
Keywords
• Ways to refine your search, such as searching for:
o images
Search types o news
o location

• Filters and sorting options to narrow down searches


Search tools
Suggested sites & • Automatic suggestions that appear as you type to help users find things faster
autofill
• Rules that dictate how words and phrases are used in a search, e.g.
o AND (+) only results that match both words
Search syntax o NOT (-) before a word will return results that do not include that word
o Matching ("") only displays results that include whole phrase

Worked Example
Describe two ways that a user can make effective use of a search engine to select information. [4]

Answer

Two linked descriptions from:

• 1. Use key words/terms (images/video/websites) [1] to return more relevant results [1]
• 2. Filter by images/video/websites [1] to return appropriate file type [1]
• 3. Filter date [1] to return more recent results [1]
• 4. Use search syntax (+ - “”) [1] to ensure results include/exclude key terms [1]
• 5. Filter by usage rights [1] to comply with copyright [1]
• 6. Filter by colour/size [1] to return results that are more fit for purpose [1]
• 7. Compare results [1] to look for accuracy / reliability / bias of results [1]
• 8. Use different search engines [1] as they use different processes/algorithms [1]

Using Information
Evaluating information
How can you evaluate information?
• To evaluate information you check it is fit for purpose
• To be fit for purpose you check a sources:

What to
How? Why?
check
• Check that information is from a reputable
source • Information could be:
• Does the information match other reputable o Incomplete
Accuracy
sources o False
• Does the source provide any evidence

73
• Old or now false
• Check publication date
Age • Too recent

• Check information's topic matches exactly • Ensure information matches topic


Relevance what you were searching for you wanted

• Compare information against other sources of • If it does not match it could be


Reliability the same information false or inaccurate

• Does the source consider different viewpoints


• Is the source just facts or does it give extra • Information could be prejudiced
context • Only looking at one side of an
Bias
• If source contains data/statistics, where did argument/viewpoint
they come from?

Understanding copyright & plagiarism


What is copyright?
• Copyright is covered under a law called the Copyright Designs & Patents Act
• This protects the intellectual property of an individual or a company
• It makes it illegal to copy, modify or distribute software or other intellectual property without the
relevant permission
• If original work is original, copyright will be automatically applied and will not expire until 25 - 70
years from the death of the creator depending on the type of work
• If an individual believes that their work has been copied it is their responsibility to take action under
the Copyright Designs and Patents Act
• Many sites online offer free downloads of copyrighted software/videos which prevents the
intellectual copyright holder from earning their income on the work they have created
o E.g. If someone downloaded videos from a Stemming platform and shared them with others,
they would be breaching the act
• The act covers videos and audio where peer-to-peer streaming prevents a copyright owner from
receiving an income

What is plagiarism?
• Plagiarism is when someone presents information or ideas from another source as their own,
without giving credit to the original author
• This can be done intestinally and unintentionally
• They may also try to claim it as their own
• A common example of digital plagiarism is copying and pasting from the internet
• If someone uses another persons information and fails to state who it belongs to they are breaking
their rights and committing plagiarism
• To avoid plagiarism a user should rewrite or rephrases information
• This shows you have read and understood information but can put it in your own words
• To avoid plagiarism always state where the information came from, this can include the authors
name or URL it was found on

Online Goods & Services


Shopping Sites
What is a shopping site?
• Shopping websites offer customers the ability to purchase a range of products and services

74
• Characteristics of shopping websites include:
o Product catalogue
o Basket
o Checkout
o Secure payments

Product catalogue
• When shopping online, users browse a catalogue of products
• Catalogues are often grouped in to categories to make browsing easier
• Catalogues are also linked so the user can have similar recommendations made for them during their
shopping experience
• When a customer selects an item from the product catalogue, then can add it to their basket

Basket
• A shopping site basket allows the user to be able to add multiple items or products from the store
to their basket
• It is a way for the user to keep everything in one place until they are ready to pay for their items
• Using a basket allows the user to be able to pay in full for their entire purchase in one transaction

Checkout
• When a user is ready to complete the purchase of their items, they will do this at checkout
• Checkout also allows users to
o edit delivery details
o use voucher codes
• Checkout can often ask users to sign in, or proceed as a guest on the site to complete their purchase
with ease

Secure payment
• When payment is made, shopping websites will use a secure payment method to ensure the
transaction is secure
• This will often be done by a third-party payment processor
• More information about security of websites can be found in in the revision note ' Methods of
Securing Data'

Advantages and disadvantages to the customer


Advantages Disadvantages
• There is a wider choice of sellers
• There is a wider choice of products
• People do not have to travel
• Users can build a profile • Security concerns
• Users can check availability • Limited physical interaction
• Users can shop 24/7 • Delivery delays and fees
• Targeted marketing provides more relevant • Impersonal custome
recommendations
• There is no need to queue
• Use can compare prices more easily

Booking System
75
What is an online booking system?
• An online booking system is a computer system that allows customers to purchases tickets for
events online
• Examples of industries that make use of these systems include:
o Travel - booking flights, hotels and package holidays
o Entertainment
▪ Music - Reserving tickets for live music events
▪ Film - Booking cinema tickets, allowing customers to pick a seat
o Leisure/sport - Purchasing tickets to sporting events, choosing their view

Advantages and disadvantages of online booking systems


Advantages Disadvantages
Convenience and accessibility (24/7 booking) Potential for technical issues and downtime
Instant confirmation and ticketing Possible security and privacy concerns
Ability to compare prices and options Transaction and booking fees
Promotions and personalised offers Impersonal and less tailored customer service
Faster to change/cancel Internet connected devices required
Automated reminders via email/text Staff may lose their job
Repeated bookings can easily be made
Staff are freed up to do other things

Worked Example
RockIT Airlines representatives use a computer booking system to book flights for customers. A
representative from the airline types in the customer reference number, the number of passengers, departure
time, departure date, departure airport and the destination airport.

Describe the processing and outputs involved in making the booking. [6]

Answer

Six of:

Display flights available [1]


The booking database is searched for the customer reference number [1]
A matching record is retrieved [1]
Details of the customer are displayed on the screen [1]
The booking database is searched for matching departure airports [1]
The booking database is searched for matching destination airports [1]
If the flight correct, the date/time found[1]
Search if seats/tickets/flights available [1]
If unavailable error message output [1]
Outputs the price [1]
If seats are available, flags seat as booked [1]
If not booked then the flag removed [1]
Reduces the number of seats/tickets available by the number booked [1]
E-ticket/ticket details are output [1]
E-ticket/ticket details sent to customer [1]
A receipt is printed//Verification email sent [1]

Banks
76
Internet banking
What is internet banking?
• Internet banking is a secure online platform for accessing and controlling a person's bank
account
• Internet banking can be accessed via the internet through a secure website or by using the banks'
official app on a smartphone
• Internet bank allows for transfers, bill payments, account management and much more

Advantages and disadvantages of Internet banking


Advantages Disadvantages
• Convenience and 24/7 access
• Requires a reliable internet connection
• Easy account management
• More risk of fraud
• Reduced need for branch visits (saving time and
• Easier to make errors (typing in the
money)
wrong information)
• Interest rates may be better
• Physical cash can't be
• Secure transactions/payments using encryption
deposited/withdrawn
• Easier to shop around for the best account

Examiner Tips and Tricks


Sometimes the question will be about advantages and disadvantages of going to the bank rather than using
online banking. Read the question carefully (you can reverse the statements in the table above)

Worked Example
Zain uses an online banking service. List two features of an online banking service. [2]

Answers

Increased access (to chat / support / service at any time [1]

Encryption / secure payments / secure data transfer [1]

Anti-fraud measures (e.g. matching name of payee) [1]

Instant mobile notifications [1]

The service can carry out multiple transactions simultaneously / no queuing [1]

One mark max for any general banking service:

Check balance [1]

Payments / transactions / transfers [1]

Order cards/chequebooks [1]

Reporting cards lost/stolen [1]

Set up a new (bank) account [1]

Loan applications [1]

77
Education & Training Providers
What is an education & training provider?
• An education & training provider is responsible for providing online access to learning
resources for users of all ages
• Features of an education & training provider include:
o Online support
o Online training courses

Online support
• Online support can be offered by education & training providers using methods such as:
o Communication channels
o Knowledge bases
o Additional support resources

Communication
Knowledge bases Additional support resources
channels
Email support Frequently Asked Questions (FAQ) section Video tutorials
Live chat Tutorials & how-to guides Webinars
Discussion forums Glossaries Downloadable resources
Online training courses
• Online training courses allow learners to access:
o Online journals and reference archives
o Online support from teachers and other learners
o Learning and assessment materials
• Online training courses are often accessed through a virtual learning environment (VLE) - link to
VLE in online communication page

Gaming Sites
What are gaming sites?
• A gaming site is an online application that hosts a game on a remote server for users to play
• Sometimes these games are multiplayer
• Gaming sites offer features that:
o Enhance the gameplay
o Build a community

Matchmaking - connect users with other users of a similar skill level

Leader boards - allow users to track progress and compare with others

Cloud saves - save game progress online, ensures no issues if a user changes
Enhance the
devices
gameplay
Microtransactions - small, in game purchases allow users to personalise characters
(cosmetics)

DLC - downloadable content that offers game expansion


Build a Friends lists/chat - allow users to connect online
community

78
Voice chat - allows users to communicate directly with other users whilst in the
game

Livestreaming - allow users to stream gameplay so that other users can watch and
interact

Esports - host tournaments where users compete for prizes

News & Auction Sites


What is a news site?
• A news site gives up to date access to stories as they break
• Notifications are used to alert subscribers
• A subscriber can choose what notifications to receive, based on preferences or categories
• News sites can also provide information on:
o Weather
o Sports
o Stock markets
o Currency values

What is an auction site?


• An auction site allows a user to list an item for sale and accept bids until a predetermined
deadline
• The user with the highest bid at the deadline wins the auction
• Auction sites use a rating system for both buyers and sellers
• Buyers with higher ratings are considered trustworthy and fast payers
• Sellers can choose to only accept bids from buyers with a high rating
• Sellers with a higher rating are considered reliable and post items promptly
• Buyers can choose to only view items for auction from high rated sellers
• Extra features used by auction sites include:
o Reserve prices - sets a minimum a seller will accept
o Buy it now - sets a price the seller would accept to end the auction early
o Notifications - notify buyers when they are outbid and remind buyers of auctions that are due
to end

Entertainment Providers
What is an entertainment provider?
• An entertainment provider is an online platform that provides access for users to digital media
• Digital media can be accessed:
o On demand
o Streaming
o Offline (downloaded)

• Browse a library of movies, tv shows or music


• Choose what to watch immediately
On
• Does not require whole content to be downloaded before playback starts
demand
• Content plays in real-time as long as stable internet connection

Streaming • Select and play content without downloading

79
• Focus on continuous playback via playlists or content with multiple episodes

• Downloaded content is stored on a local device


• Internet is not required for playback
Offline
• Downloads can be permanent or temporary rented content

• Many platforms offer a mixture of these methods so that a user has total flexibility
• Examples of such platforms include:
o Netflix
o Spotify
o Prime video

Lifestyle
What is the impact on peoples lifestyle?
• The impact on peoples lifestyles is evident from the availability of online goods and services
• The availability of online goods and services saves people time
• Availability brings positive impacts on lifestyle areas such as:
o Grocery shopping
o Travel booking
o Banking
o Learning
o Information providers

Lifestyle Benefits
Convenient - Place orders at any time, from anywhere

Convenient - Choose delivery slots or click and collect

Grocery shopping Convenient - No crowds

Comparison - Compare prices and deals across different stores within a few clicks

Variety - Access items sometimes not available in local stores


Time-saving - Find, compare and book all in one place

Travel booking Flexible - Make changes to bookings easily, find last minute deals

Choice - Access to a much bigger variety of options


Convenient - 24/7 access

Convenient - Easier to shop around for the best account


Banking
Time-saving - Reduced need for branch visits

Control - Track spending, pay bills, all in real time


Accessible - Study anytime, anywhere

Learning Personalised - All learning styles catered for, adaptive platforms adjust to your pace

Choice - Access to more subjects & topics that can be found in a traditional classroom

80
Speed - Instant access, no more waiting
Information
providers Variety - Access to a wide variety of information, from different view points and
perspectives
• The availability also has some drawbacks, such as users becoming:
o less patient and more demanding
o more isolated
o more concerned with checking online communication and reduce their face-to-face
communication skills
o prone to skim reading online content and are less likely to pay attention to detail

Worked Example
Rose likes to listen to music

Explain one benefit to Rose’s lifestyle of being able to listen to audio streamed online, rather than
downloading it. [2]

Answer

She can listen to music on the go [1] because streaming does not require bulky storage [1]

OR

She can listen to audio from any device [1] because it is stored on a server [1]

OR

Streaming lets Rose get the latest news [1] because a live recording can be broadcast [1]

Transactional Data
What is transactional data?
• Transactional data is data that is sent between two connected digital devices on the internet
• This data is stored in cookies
• Cookies are information left on a users device so that a website can recognise the user when they
visit again
• Encryption is used when transmitting cookies
• Data stored in a cookie includes:
o Time & date of the transaction
o IP address
o Data on products or services that a user has previously viewed/purchased
o Items added to a shopping cart
o Buttons pressed
o Data entered in to web forms
• There are three types of cookies

Type Features Used for


• Temporary - lost when you close the • Keeping track of shopping carts
Session browser • Remembering login status
cookies • Considered less of a privacy concern • Form inputs

81
• Remembering login details for future
• Stored on a local storage device
visits
Persistent • Have an expiration date set by website
• Tracking browsing history
cookies (days to years)
• Delivery of targeted advertising

• Do not belong to the website visited


• Owned by third-parties that provide
services to the website • Allowing external companies to track
• Examples include: activity
Third-party
• Social networking sites • Used to target user with adds or
cookies
• Advertising networks personalise website experience
• Considered a bigger privacy concern as
create a much large profile of a user

Targeted marketing
• Targeted marketing is when third-party cookie data is used to match people based on browsing
history or personal attributes
• When a user visits a website that uses an ad server, the adverts will be specific to the users third-
party cookie data

Worked Example
Rose purchases a smartphone online.

Describe two ways in which transactional data could be used during a purchase [4]

Answer

Two descriptions such as:

Products selected / purchase history / sites visited [1] could be used to suggest related products/services [1]

OR

Location data [1] could be used to set costs [1]

OR

Previous preferences / payment details [1] speeds up checkout [1]

Online & Local Services


What are the advantages and disadvantages of online & local services?
• The advantages and disadvantages of online & local services depends on the users needs and
preferences
• They include:
o Urgency
o Price
o Choice
o Online experience

82
Online services
Advantages Disadvantages
Convivence - No travelling, can use anytime, anywhere Security - Online scams, fraud and data breaches
Returns & exchanges - Inconvenience caused
Selection - Access to wider variety of options
when needing to return items, especially bigger
(local/national/international)
items
Competitive prices - Online stores typically have lesser Delayed gratification - Have to wait for items, can
costs so can be very competitive with prices be frustrating
Reviews & ratings - Read customer reviews and see Limited customer service - Impersonal or
product ratings before purchasing difficult to reach comparted to local businesses
Local services
Advantages Disadvantages
Limited selection - Smaller selection compared to
Immediate gratification - No waiting for deliveries
online
Inspecting products - Can check before purchasing Higher prices - Higher overheads lead to higher prices
Travel & time - Inconvenience/extra cost caused by
Easier returns & exchanges - Easier in person
travelling and waiting
Supporting local economy - Supporting local
Limited access hours - Limited opening hours
businesses/communities

Cloud Services
What is the cloud?
• The cloud is a word used to describe the use of the internet to:
o Store data
o Access software
• Data & software accessed locally are confined to the resources of the specific device you are using
• Data & software accessed using the cloud rely on an internet connection

Hosted & local software


What is hosted software?
• Hosted software is software accessed using the internet
• Unlike local software where installation files are stored on local secondary storage, the software is
stored on a remote server
• Hosted software can also be called web applications (web apps)
• Software is hosted on a server and accessed through a web browser
• Common examples of hosted software include:
o Microsoft Office 365
o Google Docs/Sheets/Slides
• Hosted software operates on a subscription model

Advantages and disadvantages of hosted software


Advantages Disadvantages
Access from different types of device Can only be accessed using an internet connection
User experience is affected by:
Combined with online storage, can save
files online
• High latency (delay)

83
• Low bandwidth (slow internet)

Features that enable collaboration Not as many features as locally installed software
Updates & security managed by someone
Privacy concerns, who has access to your data
else
Cost effective (pay monthly plans) Hidden fees can add up
Online & local storage
What is online storage?
• Online storage (cloud storage) is a term to describe long-term (secondary) storage of data that
resides in a remote location, accessible only via a wide area network (Internet)
• Data is stored on remote servers, typically using magnetic storage (HDD), but increasingly using
solid state (SSD)
• The three types of online storage are:
o Public cloud - The customer and the cloud storage provider are different companies
o Private cloud - The customer and the cloud storage provider are a single organisation
o Hybrid cloud - Combines both public and private cloud options and allows for sensitive data
to remain private whilst providing public cloud services for less sensitive information

Advantages and disadvantages of online storage


Advantages Disadvantages
A stable internet connection is required to use cloud
Data can be accessed from anywhere
storage
Data can be accessed by anyone with the relevant
Storing data in the cloud may be vulnerable
permissions, making it quick to share files and
to security breaches
collaborate with others
Data can be accessed on any device with an internet The user is dependent on the storage provider for the
connection availability and reliability of its services

Allows customers to increase or decrease their Should the company dissolve or cease to exist, all
storage capacity as needed cloud data may be lost

Providers often use multiple servers to store and As the amount of storage or bandwidth required
backup data, reducing the risk of data loss due to increases, the service may become expensive over
hardware failure time

Worked Example
Explain one drawback of using cloud storage to back up a digital music library [2]

Answer

• Uploads will take a long time [1] because bandwidth is limited / file sizes are large [1]
• Increased cost [1] as data often charged per Mb used [1]

84

You might also like