Sme RN Ict P1
Sme RN Ict P1
ICT P1
What is a microprocessor?
• A microprocessor is an integrated circuit (IC) that contains a central processing unit (CPU)
• A microprocessor is embedded into devices to help them carry out tasks
• The microprocessor is responsible for executing instructions
• Microprocessors are used in a home to monitor and control devices such as:
o Central heating systems
o Security alarm systems
o Home entertainment system etc.
Smartphones
• A smartphone is a versatile general purpose device
• Smartphones use subscriber identity module (SIM) cards to link the devices to a network carrier,
allowing them to make phone calls and send messages
• Smartphones include features such as:
Feature Description
• Quick communication
• Messages are stored on the device and can be read at any time
SMS messaging
• Use virtual keyboards and predictive text
Voice over internet protocol • Audio & visual communication via the internet
(VoIP) • Requires extra apps installed on the devices
2
• Can make & receive calls via smartphone, tablet and computers
• Requires a forward facing camera for video calls
• Uses NFC
Mobile payments
• Smartphones have built-in cameras for video calls
Camera • Camera can act as a barcode scanner for QR codes
Specialist
• A specialist phone is designed for a particular groups of users or environment
• They prioritise specific features over general purpose use
• Brightly coloured
• Robust
• Child friendly interface
Children's phones
• Limited app access
• Parental controls
3
Due to battery size they usually require Typically longer battery life depending on
Battery life
charging more often than a tablet usage
Multifunctional devices
What is a multifunctional device?
• A multifunctional device is a device designed to carry out a wide range of tasks
• Multifunctional devices combine functions that would usually be separate
• Examples of multifunctional devices include:
o Smartphones - Communication, photography, gaming, media playback/streaming, web
browsing all in one device
o Printers - Printing, copying and scanning in one device
o Smart TVs - Watch TV, connect to the internet, stream content
What is convergence?
• Convergence is the merging of technologies that would usually be separate
• Convergence led to the rise of smartphones
Worked Example
A. Which one of these could be used as a desktop replacement computer?
Laptop
Mainframe
Media Player
Server
[1]
[2]
4
Answers
A. Laptop [1]
• Portability
• Internet connectivity
• Cloud storage
• Hosted applications
• Collaboration
Example
• Workers can connect to the Internet [1] to access cloud storage [1]
Feature Description
Portability How easy is the device to carry around
Performance Processing power/memory (RAM)
Storage How much data can the device hold
Connectivity How can the device connect to other devices
Media support What media formats can the device play
Energy consumption How much energy does the device consume
Expansion capability Can more storage, memory or other features be added
What security features does the device have to help protect device and user
Security features
data
What is a user interface?
• A user interface is how the user interacts with the operating system
• Examples of user interfaces include:
o Command Line Interface (CLI)
o Graphical User Interface (GUI)
o Menu
o Natural language (NLI)
5
What is a command line interface?
• A Command Line Interface (CLI) requires users to interact with the operating system using text
based commands
• CLIs are more commonly used by advanced users
• Examples of CLIs are MSDOS (Microsoft Disk Operating System) and Raspbian (for Raspberry Pi)
6
Most common ports
Multiple, wide variety of Wireless (Wi-
Connectivity available but fewer
ports (USB, HDMI etc.) Fi/Bluetooth)
number
• RSI (strain on
wrist)
• Intuitive and precise • Requires flat
control surface
Mouse To select on screen objects • Fast to make on- • People with
screen choices disabilities can
find them
difficult to use
• Enhances • Expensive
gameplay/simulation • Limited use
Moves sprites/characters around a experience outside of
Joystick
game • Improve realism gaming and
• Accurate simulators
• Precise • Cost
• Natural feel • Learning curve
Graphics tablet Use a stylus to draw or write
• Ergonomic • Battery life
7
• Easy to share can lead to a
loss in quality
• Real-time
• Image quality
communication
• Privacy
Webcam Streaming images/video • Cheap
concerns
• Multipurpose
• Requires line-
• Fast and accurate
of-sight
• Low cost
• Barcodes can
• Allows for automatic
Barcode scanner Reads barcode labels be
stock control
swapped/altered
• Tried & trusted
by consumers
• Fast
• Reader must be
Magnetic stripe • Simple to use
Debit/credit cards in close contact
reader • Secure (unreadable)
• Requires PIN
• Secure
Chip and PIN input
Retail card payments • Reduced fraud risk
reader • Potential for
skimming
8
• High payment
limits an issue
for stolen cards
• May require
• Generally accurate
calibration
• Provides real-time
• Data must be
information
converted to
• Automatic
Measure environmental data e.g. digital data
Analogue sensors • Can collect data from
temperature, light, sound, humidity etc. (ADC)
places where they
• Data may need
may be threat to
to be checked
human life
for accuracy
Output devices
What is an output device?
• Output devices are hardware components that receive information from a computer
system and present it to the user in a comprehensible form
• They enable the computer to communicate the results of processed data or commands
9
Dry ink
Home printing &
photographs
• Lower initial cost • Slower
Uses wet ink separated
• High-quality prints • Higher cost per page
Inkjet printer into black, cyan,
• Ink can be refilled • Ink may smudge
magenta & yellow
• High accuracy
• Slow
• Can print on various
Create drawings & • Expensive to buy
Plotters materials
blueprints • Large size
• Inexpensive to run
• Requires darkened
• Large display room
Multimedia Output computer usually • Good for presentations • Expensive bulbs
projector to much larger display • Space saving • Need separate audio
• Quality is variable
• Requires power
• Precise movement
• Potential mechanical
• Programmable
Control motors, pumps, wear
Actuators • Allow automatic control
switches etc. • Requires DAC
of many devices
interface
Worked Example
List two peripheral devices that could be used to input text by people who are unable to use a mouse and
keyboard
[2]
10
Answer
• Microphone
• Touchscreen
• Trackpad
• (Graphics) tablet
• Camera / Eye tracker / Gesture sensor/reader
Devices
• Desktops: Ideal for high-performance tasks including graphic design, and video editing
• Laptops: Portable, with similar functionality to a desktop, and suitable for a wide range of tasks
including studying and day-to-day business
• Tablets: Lightweight, touch-controlled, good for reading, browsing, and simple applications
• Smartphones: Highly portable, useful for communication and light computing tasks including email
and web browsing
Peripherals
• Keyboards and mouse: Essential for desktop setups and for ergonomic options to enhance comfort
Monitors: Larger screens improve productivity and reduce eye strain - they are also essential in
aiding the use of computers for users with severe visual impairment
Printers and scanners: Necessary for hard copy documentation, including increasing the size of
documentation for users
11
o Productivity software
o Specialised software
o Accessibility software
Productivity Software:
• Word processors: Essential for creating and editing documents
• Spreadsheets: Used for data analysis and data management
• Presentation tools: Vital for creating engaging presentations
Specialised Software:
• CAD programs: Necessary for design and engineering tasks
• Graphic design tools: Critical for creating visual content
• Database management systems: Important for organising and managing large data sets
Accessibility Software:
• Screen readers: Convert digital text into speech for visually impaired users
• Voice recognition software: Allows users to control devices and input text using voice commands
• Magnification tools: Enlarge text and images on the screen for users with low vision
System Configuration
• Display settings: Adjust screen resolution, brightness, and font size for better readability
• Audio settings: Customise volume and audio output options to enhance listening experience
• Accessibility features: Enable high-contrast modes, screen magnifiers, and voice commands.
12
Accessibility
Hardware solutions
• Adjustable monitor stands: Provide ergonomic viewing positions to reduce strain
• Alternative input devices: Use trackballs, head pointers, or adaptive keyboards for users with
limited dexterity
• There is a wide variety of other accessibility hardware features available such as:
o Gesture interface
o Braille keyboards
o Reading pen
o Puff suck switch
o Foot pedals
o Eye typers
Software solutions
• Screen readers: Assist users with visual impairments by reading on-screen text aloud
• Voice-to-text applications: Enable users to dictate text and control devices via voice commands
• Customisable keyboard shortcuts: Simplify navigation and command execution for users with
motor impairments
Worked Example
Some learners have accessibility needs. Describe two way that ICT systems can be configured to support
learners with accessibility needs [4]
Answers
13
What is application software?
• Application software (abbreviated 'apps') is software chosen by a user to help them carry out a
specific task
• Application software is installed on top of system software and is user-chosen to best suit industry
requirements
• Common categories of application software include:
o Word processing: creating and editing text documents
o Spreadsheet: organising and analysing data in a grid format
o Database management systems: storing, retrieving and managing data in databases
o Control/measurement: uses sensors to measure and control a system
o Video editing: creating and modifying video files
o Graphics editing: creating and modifying images
o Audio editing: creating and modifying sound files
o Computer-Aided Design (CAD): designing and modelling objects in 2D or 3D
14
Utility software
What is utility software?
• Utility software is software designed to help maintain, enhance and troubleshoot/repair a
computer system
• Utility software is designed to perform a limited number of tasks
• Utility software interacts with the computers hardware, for example, secondary storage devices
• Some utility software comes installed with the operating system
• Examples of utility software and their function are:
Defragmentation (maintain)
• Defragmentation software groups fragmented files back together in order to improve access
speed
• As programs and data are added to a new hard disk drive, it is added in order, over time as files are
deleted this leaves gaps
• As programs and data are added over time, these gaps get filled and data becomes fragmented
• Defragmentation can only used on magnetic storage
Compression (enhance)
• Compression reduces the amount of secondary storage required by performing an algorithm on the
original data by writing the number occurrences of same pattern.
Encryption (enhance)
• Encryption is the process of scrambling data using an algorithm from plain-text into cipher-text in
order to make it unreadable to users without the master key
• Encryption software enhances the security of the computer system and keeps data safe
Worked Example
Describe how utility software can reduce access times for large files stored on magnetic media
[2]
15
Answer
Operating Systems
Role & function of an operating system
What is an operating system?
• An operating system (OS) is software that provides an interface between the user and the
hardware in a computer system
• An operating system hides the complexities of the hardware from the user, for example:
o A user does not need to know 'where' on secondary storage data is kept, just that it is saved
for when they want it again
• There are two main types of operating systems:
o Single User Operating System
o Network Operating Systems (NOS)
• An operating system has many functions, this includes:
o Memory management
o Resource management
o Security
o Print spooling
16
• Inputs & outputs
o Input/output (I/O) management is a process carried out by the operating system managing
the way input and output devices interact with software
o The OS allocates system resources to inputs/outputs to ensure efficient operation
o I/O management makes plug-and-play (PnP) functionality possible, automatically
detecting and configuring new inputs/outputs without the need for manually installing
device drivers or power cycling the system
• Files
o File management is a process carried out by the operating system creating, organising,
manipulating and accessing files and folders on a computer system
o The OS manages where data is stored in both primary and secondary storage
o File management gives the user the ability to:
▪ Create files/folders
▪ Name files/folders
▪ Rename files/folders
▪ Copy files/folders
▪ Move files/folders
▪ Delete files/folders
o The OS allows users to control who can access, modify and delete files/folders (permissions)
o The OS provides a search facility to find specific files based on various criteria
Security
• Security management is a process carried out by the operating system enabling different users to
log onto a computer
• A system administrator is able to allocate different access rights for different users on a network
• The OS is able to maintain settings for individual users, such as desktop backgrounds, icons and
colour schemes
• The OS audits (keeps a log of) files created by users, accesses, edits and deletes
• Operating systems can provide software firewalls
Print spooling
• Print spooling is a process carried out by the operating system when printing is required
• The spooler creates a temporary holding area (queue) for the print job
• Queuing pages increases efficiency
Worked Example
Explain one reason an administrator would use a network operating system to manage users.
[2]
Answer
• Multiple people can use the same computer [1] because users can be added/deleted [1]
• Only specific users can securely access their storage space [1] because user permissions can be
edited [1]
• Only certain users can install programs / access certain files [1] because user permissions can be
enforced [1]
• The limited storage on the machine can be shared [1] because the amount of resources/storage each
user can access can be controlled [1]
17
Application Software
Office-productivity tools
What are office productivity tools?
• Office productivity tools are applications designed to enable common work related tasks to be
carried out
• Office productivity tools are often combined into a single application suite
Word processing
• Word processing software is software used primarily for tasks involving text and images
• Common tasks include:
o Letters
o Reports
o Essays
o Books
• Examples of word processing applications include:
o Microsoft Word
o Google Docs
Spreadsheet
• Spreadsheet software is software used for tasks involving calculations
• Formulas and functions can be used to aid complex arithmetic calculations
• Examples of spreadsheet applications include:
o Microsoft Excel
o Google Sheets
Desktop publishing
• Desktop publishing software is software used for tasks that involve complicated page layouts
• Common tasks include:
o Newsletters
o Leaflets
• Examples of desktop publishing applications include:
o Microsoft Publisher
o Adobe InDesign
Database
• Database software is software used to store data
• Common features include:
o Data entry form design
o Perform queries to select data that meet a certain criteria
o Build reports to display data in a readable format
• Examples of database applications include:
o Microsoft Access
o Oracle MySQL
18
• Examples of web authoring applications include:
o Adobe Dreamweaver
o Google Sites
Presentation software
What is presentation software?
• Presentation software is software designed to allow users to create multimedia content that can be
displayed typically on slides
• Common features include:
o Transitions & animations
o Presenter notes
o Automatic or timed navigation
• Examples of presentation applications include:
o Microsoft PowerPoint
o Google Slides
Control software
What is control software?
• Control software is software that users sensors to capture inputs, processes them and outputs
something
• They make something happen in the physical environment
• Outputs can be commands that control devices such as:
o Actuators
o Motors
• Commonly used in engineering, vehicles and building control
19
o Timeline - shows a graphical representation of events and the time and order in which they
occur
o Critical path - allows a project manager to see the shortest time a project will take to
complete
o Milestones - a time or date by which a task must be completed
• Gannt charts are often used to visualise project timelines
Worked Example
Describe how application software is different from systems software
[2]
Answer
• Application software is used to carry out tasks for the user [1]
• Systems software carries out tasks for the machine/computer [1]
Software Licenses
Free/open source & proprietary software
What is a software licence?
• A software licence is a legal agreement that lays out rules for how software can and can't be used
• There are two main types of software licence, each with very different rules
on usage, distribution and support, they are:
o Free or open source
o Proprietary
• Costs money
• Produced by 'professional' companies
Proprietary
• More regular official updates/support/upgrades/fixes
Worked Example
State what is meant by the term ‘open source software’. [2]
Answer
Communication Software
Communication Software
What is communication software?
• Communication software is software that provides remote access to systems
• To exchange files and messages in text, images, audio and/or video formats between different
computes or users
• Common examples of communication software include:
o Web browsers
o Email
o Social media
o SMS/MMS
o Instant messaging
Web browsers
• A web browser is a piece of software used to access and display information on the internet
• The purpose of a web browser is to render hypertext markup language (HTML) and display web
pages
• Web browsers interpret the code in HTML documents and translate it into a visual display for the
user
Email
• Email is a method of exchanging messages and files over the internet
• The main uses of email are:
o Personal communication
o Professional correspondence
o Marketing
• Companies provide guidelines about acceptable use of emails
• Guidelines about emails from a company include:
o Purpose of the email
o Using acceptable language
21
o Email security, including anti-virus software
Social media
• Social media is a platform where users can connect with others and share content
• They include platforms such as
o Facebook
o Tiktok
• Social media platforms usually require users to create a profile and allow them to share text,
images, videos, and links
• They facilitate interaction, collaboration, and information sharing on a large scale
• Privacy settings allow users to control who can see their content
SMS/MMS
• Short messaging service (SMS) and multimedia messages service (MMS) are a method of
communication using a mobile phone network
• No internet connection is required
Instant messaging
• Instant messaging requires an internet connection to allow multimedia communication between
single and groups of users
• Includes extra features such as:
o See when users are typing (online/offline status)
o Include location data
Worked Example
Describe the function of a web browser [2]
Answer
Software Updates
Why is software updated?
• Software is updated to:
o Fix bugs or software vulnerabilities
o Increase compatibility with newer operating systems
o Improve performance
o Introduce new features
o Improve usability
• Updates are typically downloaded from the internet by a user or automatically from within the
software itself
• Operating system can schedule updates to suit user needs and minimise disruption
22
o Workflow disruption - new features/interface tweaks may need time to adjust to, slowing
down productivity
o Update issues - in rare cases the installation process can go wrong, leading to data loss
Worked Example
Fyn want to play a game he installed a year ago
B. Give 2 reasons why Fyn should update the game software [2]
Answers
A.
B.
Ch-3 Memory
RAM & ROM
What is RAM?
• RAM (Random Access Memory) is primary storage that is directly connected to the CPU and holds
the data and instructions that are currently in use (temporary)
• RAM is volatile which means the contents of RAM are lost when the power is turned off
• For the CPU to access the data and instructions they must be copied from secondary storage
23
• RAM is very fast working memory, much faster than secondary storage
• RAM is read/write which means data can be read from and written to
• In comparison to ROM, it has a much larger capacity
• RAM capacity can be increased to improve performance
What is ROM?
• ROM (Read Only Memory) is primary storage that holds the first instructions a computer needs
to start up (Boot file)
• ROM contains the BIOS (Basic Input Output System)
• ROM is a small memory chip located on the computers motherboard
• ROM is fast memory, much faster than secondary storage but slower than RAM
• ROM is non-volatile which means the contents of ROM are not lost when the power is turned off
• ROM is read only which means data can only be read from
• In comparison to RAM, it has a much smaller capacity
• ROM capacity can not be increased
• Some types of ROM can be changed
o EPROM - erasable programmable read only memory
o EEPROM - electronically erasable programmable read only memory
Worked Example
Explain one negative impact of a user decreasing the amount of RAM in a computer
[3]
Answer
• Programs will load more slowly / Fewer applications can be open at the same time [1]...
• ...as they are more reliant on being read from secondary storage / virtual memory / HDD / SSD [1]...
• ...which has slower read/write times than RAM [1]
24
• Storage devices are non-volatile secondary storage, that retain digital data within a computer
system
• They provide a means of storing, accessing, and retrieving data, which can include software
applications, documents, images, videos, and more
• There are 3 types of storage device:
o Magnetic
o Solid State
o Optical
Magnetic storage
• Magnetic storage is a type of non-volatile media that uses magnets (polarity) to store binary 0s and
1s
Advantages Disadvantages
Capacity - High storage Durability - Moving parts can get damaged if dropped
Cost - Low per gigabyte Portability - Heavy & bulky making them less convenient for transport
Speed - Moderate read/write access Reliability - Prone to mechanical failure
Noise - Loud (spinning disks)
Solid state storage
• Solid state storage is a type of non-volatile media that uses electronic circuits to store binary 0s and
1s
Advantages Disadvantages
Capacity - Medium/high storage Cost - Very high per gigabyte
Speed - Very fast read/write access Reliability - Limited read/write cycles
Durability - No moving parts
Portability - Small and no moving parts
Noise - Silent
Optical storage
• Optical storage is a type of non-volatile media that uses lasers to burn the surface of a disk, creating
pits and lands suitable for storing binary 0s and 1s
Advantages Disadvantages
Cost - Very low per gigabyte Capacity - Very low
Durability - No moving parts Speed - Very slow read/write access
Portability - Small and no moving parts Reliability - Prone to scratches
Noise - Silent
Capacity of storage
What is capacity of storage?
• Capacity of storage describe the amounts of binary digits that can be stored on a digital device
• These are the units you need to know for this IGCSE:
Worked Example
Explain one benefit of using solid state storage with a smartphone [2]
Answer
• Data (transfer) will not be negatively affected by movement / less risk of damage to the drive [1]...
• ...because solid state storage does not use moving parts [1]
OR
OR
Storage Media
What is storage media?
• Storage media is the physical media that holds non-volatile data
• Storage devices have a specific read/write mechanism built in to interact with a particular storage
media
• For example, magnetic tape media is read by a magnetic storage device
Media
Hard disks
• Hard disks are a magnetic storage media
• Made up of platters that spin on a central spindle
• A read/write head moves on an arm across the platter to read/write data
• The amount of time taken to read/write data is influenced by:
o How fast the platters spin (measured in revolutions per minute (RPM))
o How fast the head moves across the platter
• Used in personal computers, servers and backups
26
Optical media
• Used with an optical storage device
• All optical media is recordable (CD-R, DVD-R, BD-R)
• Some optical media can be re-written (CD-RW, DVD-RW, BD-RE)
• Used for multimedia (music, games & films)
Magnetic tape
• Old technology used primarily for recording sound
• Now used to store vast amounts of data (backups)
• Very slow read/write speeds
• Used for whole system backups and archives
Worked Example
A USB flash memory card has 64 MiB of storage capacity.
Answer
Decode stage
• During the decode stage of the cycle, the CPU needs to work out what is required from the
instruction
• This could be a range of tasks depending on what the instruction or data included
27
Execute stage
• During the execute stage of the cycle, the CPU will carry out the instruction that was fetched
• Some examples that would take place at this stage are
o Performing a calculation
o Storing a result or data back in main memory (RAM)
o Going to main memory to fetch data from a different location
Number of cores
• A core works like it is its own CPU
• Multiple core processors mean they have multiple separate processing units that can fetch, decode
and execute instructions at the same time
• Multi-core processors can run more powerful programs with greater ease
• Multiple cores increase the performance of the CPU by working with the clock speed
o Example: A quad-core CPU (4 cores), running at a clock speed of 3Ghz
▪ 4 cores x 3GHz
▪ 4 x 3 billion instructions
▪ 12 billion instructions per second
Worked Example
Describe how the speed of the processor affects a users experience when playing a game [4]
Answer
• Faster processors fetch/decode/execute more instructions/data / have more cycles [1] per second [1]
so:
Ch-3 Connectivity
How Digital Devices Communicate
Satellite
What is satellite communication?
• Satellite communication uses radio waves for wireless communication
28
• Signals are sent between satellites and ground stations on earth
• Ground stations transmit the radio wave to antenna within or connected to a digital devices
• The advantage of satellite communication is that the service is always available
• The disadvantages of satellite communication is that the service can be interrupted by weather
conditions and signals do not pass through solid objects
Satellite television
• Digital Video Broadcasting (DVB) is the international standard for broadcasting digital television
• Digital Video Broadcasting-Satellite (DVB-S) is an example of DVB
• A video signal is sent from a broadcaster to a satellite, and sent back to earth to an antenna
connected to a set-top box or directly to a television
• The set-top box or television decodes the signal to make it watchable
TV & radio
What is digital television and radio?
• Digital Video Broadcasting Terrestrial (DVB-T) and Digital Audio Broadcasting (DAB) are methods
of transmitting video and audio signals from transmitters to an antenna
• Transmitters are based on earth
• Once received by the antenna, signals travel through wires to a television or radio receiver
which decodes the signal and converts it into video and/or audio
• The advantages of digital television and radio are:
o Improved video/audio quality
o Access to more channels/stations
Wired
What are wired methods of communication?
• There are a number of wired methods of communication, some are designed to transmit a specific
type of data and some are universal
Type Use
High Definition Multimedia
High definition video and audio signals
Interface (HDMI)
Sony/Phillips Digital Interface
Transmit digital audio streams between devices
Format (S/PDIF)
3.5mm jack commonly used to connect headphones, speakers and
Mini-jack
microphones to devices
Ethernet Networking standard for connecting devices to a local area network (LAN)
Connecting and powering various devices such as printers, flash drives,
Universal Serial Bus (USB)
keyboards, mice etc.
Wireless
What are wireless methods of communication?
• There are a number of wireless methods of communication, including:
Type Use
Wireless Fidelity (Wi-Fi) A wireless method of connecting devices to a local area network (LAN)
Bluetooth Allows two devices to connect to each other over very short distances
Infra-red (IR) Transmits tiny amounts of data over very short distances
Near Field
Use close proximity RFID (radio frequency identification)
Communication (NFC)
4G and 5G Provides internet access to mobile devices
29
Worked Example
Smartphones can be connected using wired or wireless methods.
Answers
Networks
Local area networks (LANs)
What is a local area network?
• A local area network (LAN) is a network which has a small
geographical area (under 1 mile)
• All of the hardware is owned by the
company/organisation/household using it
• LANs will use unshielded twisted pair (UTP) cable, fibre optic cable or
wireless connections (Wi-Fi)
30
Wide area networks (WANs)
What is a wide area network?
• A wide area network (WAN) is a network which has a large geographical
area (over 1 mile)
• They are a collection of LANs joined together
• The computers on a WAN are connected via routers
• The hardware used to connect the networks together is not all owned by the
company/organisation/household using it.
• For example, telephone lines owned by telecommunication companies
• WANs will use fibre optic cable, telephone lines and satellite to connect the LANs together
Tethering
What is tethering?
• Tethering is when a host device shares its internet connection with other connected devices
• Commonly used by mobile devices to share its mobile data connection to devices such
as laptops and tablets
• Tethering can be enabled or disabled as part of the mobile contract
• Some network providers charge extra to use this feature
Worked Example
Draw a diagram to show how a smartphone can be used to provide a tablet computer with an Internet
connection.
Label each component and the connectivity you use in your diagram [4]
Answer
Wireless Communications
31
Wi-Fi
What is Wi-Fi?
Advantages Disadvantages
• Portability - Easy to move around, location is • Speed - Slower data transfer than
only limited by range Ethernet
• Cost - Less expensive to setup and add new • Security - Less secure than Ethernet
devices • Range - Relies on signal strength to the
• Compatibility - Most devices are manufactured WAP, signals can be obstructed (up to
with a built in Wi-Fi adapter 100m)
Bluetooth
What is Bluetooth?
• Bluetooth is another common standard for wireless networks
• Bluetooth is common in most homes and offices to connect devices such
as headphones, controllers, keyboards & mice
• Bluetooth is used typically for a direct connection between two devices
• When two devices pair, they both exchange a cryptographic key
• The keys are used to generate a secret shared key which is used to encrypt the data between the
two devices and create a Wireless Personal Area Network (WPAN)
Advantages Disadvantages
• Compatibility - Ideal for personal • Speed - Very slow transfer speeds
devices and ad-hoc connections • Security - Data can be intercepted by anyone in range
• Power - Very low power consumption • Range - Short range (30m)
Advantages Disadvantages
• Wide coverage area • Expensive setup and maintenance
• Real-time data transmission • Signal interference due to weather or obstacles
• Improved communication in remote locations • Limited bandwidth and capacity
• Accurate location tracking • Privacy concerns and potential for Surveillance
3G & 4G
What is 3G & 4G?
• 3G and 4G are references to the 3rd and 4th generation of mobile data networks
• They provide mobile devices with wireless access to the internet
• Each generation has a faster transfer rate and an improved capacity for more users
o 3G - 256 Kbps (kilobits per second)
o 4G - 100+ Mbps (megabits per second)
• The current generation (5G) has even faster speeds and lower latency
Infra-red (IR)
What is infra-red?
• Infra-red is a wireless communication method used to transfer very small amounts of data to a
device in direct line of sight
• Commonly used in remotes to control devices such as:
o Televisions
o Audio receivers
o Home entertainment equipment etc.
• Uses light waves which can cause:
o Walls or obstacles to block the signal
o Sunlight to affect the signal
• It is a reliable and cost effective solution for many short-range wireless communication needs
NFC
What is NFC?
• Near field communication (NFC) is a subset of RFID which allows communication between two
devices in very close proximity
• NFC can be either:
o Passive - uses energy from the reader
o Active - has it's own power source
• Smartphones use active NFC to allow contactless payments by tapping a smartphone on a reader
• Smartphones can also exchange data using NFC by tapping together (usually back to back)
Advantages Disadvantages
• Convenient • Limited range
• Secure • Slow data transfer rate (not suitable for
• Very fast transferring large files)
• Low power consumption • Compatibility
Worked Example
George uses a smartwatch when he exercises outside.
The smartwatch connects to a wireless health monitor to track his heart rate.
33
The health monitor uses Wi-Fi to transfer data to the smartwatch.
A. Speed is not a concern. Explain why Wi-Fi is a better choice than infrared for this transfer [2]
B. Explain why distance might affect the speed of the transfer [2]
Answers
• Wi-Fi does not require line of sight / Infrared requires line of sight [1] which is not always possible
when moving/exercising [1]
OR
• Infrared is / Wi-Fi is not affected by sunlight [1] (which will affect the data transfer because) the
health monitor will be used outside [1]
What is latency?
• Latency is the delay between data being sent and received
• If there is a big delay between the two, more data will be on the network causing collisions
• This can lead to even more packets of data being sent as the error rate will increase
34
Impact on user experience
• Playing games online smoothly, requires a high bandwidth
• A high latency can cause lag and the game will not respond as quickly as a users commands
• This can cause big issues when users are playing fast paced games or playing against other users
with a lower latency (have an advantage due to quicker response times)
• Streaming sport content with a high latency can cause micro-stutters and ruin a users watching
experience
Worked Example
Describe how high latency can affect the experience of making a video call from a smartphone [2]
Answer
• It increases the time it takes for data to be transferred between devices [1] meaning his voice/video is
out of sync / lagging / delayed [1]
Identifying Devices
35
IP Addresses
What is an IP address?
• An IP (Internet Protocol) address is a unique identifier given to devices which communicate over
the Internet (WAN)
• IP addresses can be allocated by a network administrator or assigned dynamically by a Dynamic
Host Configuration Protocol server (DHCP)
• IP addresses make it possible to deliver data to the right device
• A device connecting to a network will be given an IP address, if it moves to a different network then
the IP address will change
IPv4
• Internet Protocol version 4 is represented as 4 blocks of denary numbers between 0 and 255,
separated by full stops
• Each block is one byte (8 bits), each address is 4 bytes (32 bits)
• IPv4 provides over 4 billion unique addresses (232), however, with over 7 billion people
and countless devices per person, a solution was needed
IPv6
• Internet Protocol version 6 is represented as 8 blocks of 4 hexadecimal digits, separated by colons
• Each block is 2 bytes (16 bits), each address is 16 bytes (128 bits)
• IPv6 could provide over one billion unique addresses for every person on the planet (2128)
MAC Addresses
What is a MAC address?
• A MAC (Media Access Control) address is a universally unique identifier given to devices which
communicate over a local area network (LAN)
• MAC addresses are static, they can never change
• MAC addresses make it possible for switches to efficiently forward data to the intended recipient
• Any device that contains a Network Interface Card (NIC) has a MAC address assigned during
manufacturing
• A device connecting to a local network already has a MAC address, if it moves to a different
network then the MAC address will stay the same
36
• A MAC address is represented as 12 hexadecimal digits (48 bits), usually grouped in pairs
• The first three pairs are the manufacturer ID number (OUI) and the last three pairs are the serial
number of the network interface card (NIC)
• There are enough unique MAC addresses for roughly 281 trillion devices
• MAC addresses can be used to:
o Restrict or allow access to a network
o Identify a device on a network
o Track a device
o Assign 'static' or 'fixed' IP addresses
Device name
What is a device name?
• A device name is a way for users to describe/name a device so that it is easier to identify on a
network
• Device names are not used by devices to communicate as they are not always unique
• Device names are set by users in the devices operating system or from a router
Worked Example
Computers in a network can be identified using both IP addresses and MAC addresses.
Answer
Components of a Network
Cables
What cables are used in a wired network?
• A wired network is a network where physical cables are used to join devices together and transmit
data
• The most common types of cables in a wired network are:
o Ethernet
o Fibre optic
37
What is Ethernet?
• Copper is a type of cable originally used in telecommunication to transmit voice signals, forming
the traditional landline phone network
• The ability to use copper to deliver network traffic on a wide area network (WAN) made
the internet possible
• Copper cables degrade over time which limits their range compared to fibre
optic
• Copper cable suffers from interference which can disrupt data quality
• Copper transmits data at a much slower rate, and has a much lower
bandwidth compared to fibre optic
• Fibre optic is a type of cable that uses light to transmit data on a wide area network (WAN)
• Fibre transmits data at a much higher speed and has a much higher
bandwidth compared to copper cables
• Fibre optic cable does not suffer from interference which makes them
the most secure option to send sensitive data
• Fibre optic cables can cover a long distance without any degradation,
they can span cities and countries
38
What is a gateway?
• A gateway is a device that bridges the connection between two different types of network
• Gateways translate between different network protocols
• For example, a local area network (LAN) to a wide area network (WAN)
What is a booster?
• A booster is a device used to amplify a network signal in order to extend the normal range
• Boosters can be used with both wired and wireless networks
• Wireless access points can be be configured to act as a booster (repeater mode)
Server
What is a server?
• A server is a dedicated computer that shares its resources with devices that connect to it
• Devices that connect to a server are known as clients
• Common examples of servers include:
o File
o Web
o Print
o Authentication
o Application
Server Function
• Allows access to shared and private resources
File
• Stores the content of websites and processes requests made via HTTP to access
Web them
• Manages print jobs and organises the queue so that individual printers are not
Print overloaded
• Stores usernames and passwords that can be checked when a user logs in
Authentication • Authenticated users receive a certificate that allows access to resources
• Allows clients access to applications that run directly from the server
Application
• A single computer can perform multiple server functions depending on its resources (memory &
processor)
39
Worked Example
One piece of network hardware is a router.
Answer
Search Engines
What are Search Engines?
• Search engines are tools that locate and display web pages related to the search terms entered by
the user
• They are essential for navigating the vast amount of information on the internet
• They index millions of web pages and use algorithms to rank the relevance of each page to the
search terms
Filter software
What is filter software?
• Filter software uses two lists stored in a database to allow or block access to websites
• URLs entered by a user are compared against both lists
• The two lists are:
o Whitelist - URLs on the whitelist are allowed and the website can be viewed
o Blacklist - URLs on the blacklist are not allowed and the website is blocked
• URLs that cannot be found on either list are allowed
40
• Filter software is used by schools and parents to protect children from accessing age
inappropriate content
• Administrators can add and remove URLs from the lists
Worked Example
Zarmeen connects her laptop to a local area network.
Answer
• Shared peripherals [1] means reduced cost/time to access a central one [1]
• Shared data [1] allows easier collaboration [1]
• Flexible access [1] allows hot desking [1]
• Shared access to the Internet [1] reduces need for individual connectivity [1]
41
Advantages Disadvantages
• Very easy to set up and maintain • Users will need to manage their own
• Very cheap to set up because there is no expensive backups
hardware to purchase • Users will need to manage their own
• No specialist knowledge or staff are required to run the software updates
network • The network can be less secure
Client-server networks
What is a client-server network?
• A client is a computer on the network, these connect to the server via a switch
• A server is a computer on a network which often has a single purpose, for example
o Managing access to the Internet
o Managing printing
o Providing email services
o Providing backups
o Controlling security
• Servers are often more powerful than the client machines
• Servers are seen as more significant than the client machines and can require specialist hardware
and software
• A network which uses a server is called a client-server model
• Most companies, organisations and schools will use a client-server network model
Advantages Disadvantages
• Servers can be expensive to purchase, setup and
• Managing backups of the network is easier as
maintain
it is done from one central point
• A specialist network manager would be required
• Updating and installing new software can be
as servers require specialist IT knowledge
done centrally instead of having to log on to
• Servers can be a single point of failure, meaning
each machine
all users would lose access to the network if the
• Security of files can be managed easily
server fails
Worked Example
Describe two drawbacks of using a peer-to-peer network [4]
Answer
Firewalls
What is a firewall?
• A firewall is a barrier between a network and the internet
• A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they
are legitimate
• It can be both hardware and software and they are often used together to provide stronger security
to a network
o Hardware firewalls will protect the whole network and prevent unauthorised traffic
o Software firewalls will protect the individual devices on the network, monitoring the data
going to and from each computer
Encryption
What is encryption?
• Encryption is a method of scrambling data so that unauthorised users cannot understand it
• Encryption methods use 'keys', which are specialised programs designed
to scramble or unscramble data
• Encryption uses complex mathematical algorithms to scramble the data
• There are two common methods of encryption:
o Symmetric
o Public key
Symmetric encryption
• The sender uses a key to encrypt the data before transmission
• The receiver uses the same key to decrypt the data
• It's usually faster, making it ideal for encrypting large amounts of data
• The significant downside is the challenge of securely sharing this key between the sender and
receiver
• If an unauthorised user captures the key, they can decrypt all messages intercepted in
transmission
WEP/WPA
What is WEP?
• Wireless Encryption Protocol (WEP) is a method of encrypting data being transmitted on
a wireless network
• Each device on the network uses the same key to encrypt and decrypt data
• It is a less secure encryption method due to all devices on the network sharing the same key
• Eavesdropping software (packet sniffers) can be used to intercept data packets and identify the
key
What is WPA?
• Wi-fi Protected Access (WPA) is a more secure method of encrypting data being transmitted on
a wireless network
• Each device connected to the network receives a different key
• New keys are used for every packet transmitted on the network
Worked Example
Describe one method that could be used to secure payment data transferred between a server and other
computers [3]
Answer
• Encryption [1] encodes/scrambles data / makes data unreadable [1] using a key [1]
Operating Online
Potential Risks to Data
Unauthorised access & accidental deletion
What is unauthorised access?
• Unauthorised access is when a user gains access to a network without permission
• Some devices are the target of hackers to be used as botnets
• Botnets are groups of computers that are used without an owners knowledge to carry out harmful
activities or spread malware
Accidental deletion
• Accidental deletion of data can occur when a user:
o Presses the wrong key on a keyboard
o Formats media on the wrong device
o Loses power unexpectedly
Malware
What is malware?
• Malware (malicious software) is the term used for any software that has been created with malicious
intent to cause harm to a computer system
• Examples of issues caused by malware include
o Files being deleted, corrupted or encrypted
o Internet connection becoming slow or unusable
o Computer crashing or shutting down
• There are various types of malware and each has slightly different issues which they cause
• Worms are very similar to viruses, with the main difference being that they will spread
Worms to other drives and computers on the network
• Worms can infect other computers from
45
o Infected websites
o Instant message services
o Email
o Network connection
• Software which will allow a person to spy on the users' activities on their devices
• This form of software will be embedded into other software such as games or programs
that have been downloaded from illegitimate sources
Spyware
• Spyware can record your screen, log your keystrokes to gain access to passwords and
more
• A form of malware that locks your computer or device and encrypts your documents
and other important files
• Often a demand is made for money to receive the password that will allow the user to
Ransomware
decrypt the files
• There is no guarantee paying the ransom will result in the user getting their data back
What is a pharming?
• Pharming is typing a website address into a browser and it is redirected to a 'fake' website to
trick a user into typing in sensitive information such as passwords
• An attacker attempts to alter DNS settings or change a users browser settings to redirect users to the
fraudulent website
46
How can pharming be prevented?
• Pharming can be prevented by:
o Keeping anti-malware software up to date
o Checking URLs regularly
o Make sure the padlock icon is visible
Worked Example
Explain why phishing messages are sent to many users [2]
Answer
• It increases the chances of a user responding [1] because not all users are vulnerable / phishing
targets vulnerable users / more people are aware of phishing [1]
Advantages Disadvantages
• Unique to the person and can not be copied,
• can be intrusive, for example, scanning
meaning that the data is always with the
eyes
person
• Scans be not be recognised, an example of
• Passwords can be easily copied, forgotten,
could be fingerprint scans with dirty hands
guessed or cracked
• Very expensive to install
• It is difficult to copy or forge biometric data
• Low light can provide an issue for facial
• Eliminates the possibility of attacks such as
recognition as well as hats and glasses
shoulder surfing and key-logging software
• People may be uncomfortable having their
• A high degree of accuracy as there is no
most unique characteristics being stored in
known way to copy a person's retina pattern
a database
for example
What is a CAPCHA?
• A CAPCHA is a method of testing if a website request originates from a human or
a machine (bot)
47
• Completely Automated Public Turing test to tell Computers & Humans Apart (CAPTCHA)
examples include:
o Text - Asking users to enter characters from a distorted text box, users would need to
decipher the characters and enter them in a designated box
o Image - A grid of images, a user would be asked to select all those that contain a specific
object
o Checkbox - A simple checkbox appears asking the user to confirm they are not a robot
• A CAPTCHA can be used to prevent spam and protect logins
Anti-malware
What is anti-malware software?
• Anti-malware software is a term used to describe a combination of different software to prevent
computers from being susceptible to viruses and other malicious software
• The different software anti-malware includes are
o Anti-virus
o Anti-spam
o Anti-spyware
Access rights
What are access rights?
• Access rights ensure users of a network can access what they need to access and do not have access
to information/resources they shouldn't
• Users can have designated roles on a network
• Access rights can be set based on a user's role, responsibility, or clearance level
o Full access - this allows the user to open, create, edit & delete files
o Read-only access - this only allows the user to open files without editing or deleting
o No access - this hides the file from the user
• Some examples of different rights of access to a school network could include:
o Administrators: Unrestricted - Can access all areas of the network
o Teaching Staff: Partially restricted - Can access all student data but cannot access other staff
members' data
o Students: Restricted - Can only access their own data and files
• Users and groups of users can be given specific file permissions
Secure websites
What is HTTP & HTTPS?
• Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for website
viewing
• HTTP allows clients to receive data from the sever (fetching
a webpage) and send data to the server (submitting a form,
uploading a file)
• HTTPS works in the same way as HTTP but with an added
layer of security
• All data sent and received using HTTPS is encrypted
• HTTPS is used to protect sensitive information such as
passwords, financial information and personal data
48
Email safety
What is email safety?
• Users should be aware of the dangers when using email, especially email attachments and web
links
• To ensure users use email safely they should take extra caution when:
o Email is from an unknown sender
o Text is general or impersonal
o Contains spelling, punctuation or grammar mistakes
o Attached files are executable files (.exe)
o Urgency is the tone of the message
o Don't recognise the URL
Backup procedures
What is a backup software?
• Backup software is used to create copies of personal data in order to keep it safe in the event of:
o Accidental loss
o Data theft
• Backups can be automated and scheduled to happen at less busy periods of the day, to not take up
valuable system resources (e.g. overnight etc.)
• Backups can be made in two ways:
o Full - all files are backed up (saftest, slow)
o Incremental - only files that have been added/modified since the last backup are backed up
(faster, less secure)
• Backups can be stored locally (secondary storage) or remotely (cloud)
• Backup software can be purchased or come as a standalone application bundled with an operating
system
49
Bank cards
• A bank card can be used to pay for good and services online using information found on the card
• When making a purchases, the following information is required:
o 16 digit card number
o Expiry date
o Security number (CVC)
• When choosing to use a bank card online, other financial institutions may be used
to authenticate the transaction, such as:
o Visa
o Mastercard
Worked Example
David buys a coffee in a store.
Answer
• Users can scan/tap their card / do not have to insert their card / do not have to enter their
PIN/code [1]...
• ...because NFC is a contactless payment method [1]
Employment
What are the impacts of the internet on employment?
• The three biggest impacts of the internet on employment are:
o change in skills requirements
o new job opportunities
o job losses
50
Skills requirements
• The demand for tech skills and competence in information communication technology (ICT)
• The ability to work with and analyse more data to make informed business decisions
• A shift in the need for particular skill sets due to more automation means potential employees
need to be adaptable
• A focus on problem solving and critical thinking rather than carrying out tasks that can now be
automated
• An increased importance on soft skills such as:
o Effective communication
o Collaboration
o Lifelong learning
• Content creation
• Search engine optimisation (SEO)
Digital marketing
• Social media marketing
• Cloud architects
Cloud computing • Security specialists
Job losses
• Employees who choose to not improve their skills using the internet may unfortunately not have
the skills required to carry out new work
• If they are unwilling to retrain this may lead to job losses
Collaborative working
• Collaborative working means employees can work on the same project or task at the same time,
in real time
• The internet enables employees to work together remotely, bridging the gap of being in the same
place at the same time
• This allows employers to choose employees from a much wider talent pool
51
Advantages Disadvantages
Co-ordination - organising meetings and keeping
Efficiency - tasks can be completed more quickly
people on the same page can be hard
Personality clashes - some people do not work
Knowledge - shared skills and experience
well in a team and can hinder progress
Creativity - access to other perspectives, problem Contribution - some members might not
solving as a team contribute equally
Advantages Disadvantages
Work life balance - can schedule work around Communication - lack of face to face can hinder
personal commitments collaboration
Productivity - working when YOU feel the most Isolation - missing social aspects of traditional office
productive environment
Fewer sick days - better work life balance leads to Management - supervising and monitoring employees
fewer absences can be more difficult
Worked Example
Sarah uses the Internet for work.
Explain one other way that the Internet could positively impact how Sarah works [2]
Answer
Impact:
Reason:
Access to Information
Does the internet give access to more information?
• Yes, the internet gives access to a wealth of information
• Individuals can keep up to date with news, sport and weather information 24 hours a day
• Traditional media such as television and radio have some disadvantages that the internet has solved
52
Television and radio Internet
Broadcast at set times 24/7 availability
Limited number of channels Millions of channels
Editors decide on content Not always edited
Only available within range of transmitter Access from anywhere with a connection
Limited access to news from other countries More open access, some content is geo-restricted
Held to standard Not always held to any standards
New ways of learning
• The internet has given people access to new ways of learning, such as:
o Virtual learning environments (VLEs) - online support from teachers and students
o Social learning - social media platforms enable learners to share resources, ideas and
projects
o Gamification - making learning engaging and interaction, promoting knowledge retention
o Virtual reality (VR) - immersive experiences, bringing abstract concepts to life
Social Impacts
Social interaction & cyberbullying
What is social interaction?
• Social communication is communication with and reaction to others
• Humans are naturally social and the internet has given users different ways to participate socially
• Examples include:
o Online gaming
o Video
o Instant messaging
o Social networking
o Online space for work & learning
• There are arguments for and against online social interaction, these are outlined below
For Against
Connection & community - connect with people with Misinformation - algorithms can limit exposure to
the same interests, regardless of location diverse perspectives and help spread misinformation
Privacy - sharing information online can lead to
Expression - platforms give a space to explore yourself
privacy concerns, where is the data kept and who
freely, find communities that can support
has access
53
Social support & mental health - give people a sense of
Distraction - online notifications can be a
belonging and support, important for people who feel
distraction, hindering productivity
isolated or struggle with mental health
Convenience - no travelling or scheduling, can take
Addiction - too much interaction can be addictive
place 24/7
Social comparisons - can lead to low self esteem
Social change - powerful tools for social activism and
and poor mental health as constantly comparing
raising awareness about important issues
yourself to others
What is cyberbullying?
• Cyberbullying is using the internet to send text, images or multimedia in order to upset or
embarrass someone
• Online bullying can range from:
o Hurtful messages
o Distributing upsetting images
o Preventing participation in online events/discussions (isolating)
• Cyberbullies can feel protected by the apparent anonymity of the internet, however most online
communication is easily monitored
• Cyberbullying can spread very quickly and to more people
Health Wellbeing
Increased risk of chronic diseases Increased anxiety and depression
Musculoskeletal problems Lower energy levels
Weakened immune system Poor sleep quality
Metabolic issues Lower self esteem
Increased blood pressure Decreased social interaction
54
• Using the internet to work from home has benefits and drawbacks for organisations and
its employees
Describe one other positive impact the Internet has on how Kevin works [2]
Answer
The Internet is always available [1] so he can work at times suitable to him [1]
OR
He can collaborate with others [1] to share expertise / reduce the time to complete a task / share
workload [1]
OR
He can access a wider range of sources [1] allowing him to make better decisions [1]
Improved communication
• The internet has made it possible for organisations to communicate with its customers easily and in
real time
• Examples of how organisations can communicate with its customers include:
o Websites
o Email
o Instant messaging
o Social media
Security issues
• Many organisations store private and valuable data that needs to kept secure
• Traditionally, data would be kept in a secure central location using physical safety measures such
as:
56
o Walls
o Locks
o Alarms
o Security guards
• The internet now means employees are able to access secure data working remotely
• Typically this is achieved in three ways:
o VPN (link here) - remotely access organisations data on servers
o Transfer a copy of organisations data to home via external storage or email
o Storing organisations data on someone else's server (cloud)
• Data being accessed remotely means it is more vulnerable to threats such as:
Threat Prevention
Employees revealing login details Policies to ensure employees are accountable for
intentionally/accidentally their actions
Unauthorised users intercepting data being transferred
Encryption
on the internet
Unauthorised users hack in to the organisations systems Firewalls/authentication
Greater competition
• The internet means organisations have greater competition for products and services
• Traditionally, organisations were only in competition with other organisations in their local area or
country
• The internet means consumers can buy from organisations globally, this extra competition can drive
down prices
• Some organisations and entire industries have been put at risk because of this, some examples
include:
Industry/service Risk
Music/film rental Online downloads & streaming
Record labels Independent artists can release their own music online
Estate agents Online advertising/virtual viewings
Newspaper publishers Online news and information services
Postal services Send messages and digital media instantly
Worked Example
Describe two positive impacts of the Internet on organisations [4]
Answer
Impact Impacts
• Before the internet, an individual would need to persuade a media outlet to
broadcast their message
Broadcasting a • It was difficult to get a message to the masses
message • Social media and video streaming have given society a platform to share their
own messages to a global audience
• Controlled by moderators
• Service owners control content can be published
• Algorithms determine what content watchers see based upon browsing history
Online content
& online activity
• Paid promotion will be seen by more users than individuals that don't pay
Negative
• Use of social media and video messaging services to organise illegal activities
whilst avoiding police
58
Unequal access & socialising
What is the digital divide?
• The digital divide is the gap between people who have access to digital devices and the
internet and people who do not
• Factors that affect people's access include:
Factor Description
• Countries with a strong economy can invest in infrastructure that provides access to
networks and the internet
Economy &
• Countries with emerging and developing economies may prioritise other needs
infrastructure
(food, healthcare etc.)
• People who live in remote locations where wireless signals and/or cabling is
Location unavailable to reach
Online Communities
What is an online community?
• An online community is a group of people with a shared common interest who communicate
online
• Every online community has:
o a function - what it does for people who use it
o features - what enables it to function
Social networking
What is social networking?
• Social networking is the practice of forming groups in society
• The internet has made it possible it possible to do this online
59
What is the function of social networking communities?
• The function of social networking communities is to allow users to connect through shared
interests or relationships
• Traditionally, they were separated in to personal and professional communities
• Personal communities included examples such as:
o Facebook
o Twitter (X)
• Professional communities included examples such as:
o LinkedIn
60
• Allows users to easily share content across other platforms (Facebook &
Third-party integration Instagram for example)
• Somewhere for users to share tips, tricks and general game talk
Discussion boards/forums
61
• Provides access to data to all users
Cloud storage
• Users can provide feedback directly in documents and tasks
Commenting
• Quick and easy communication between users
Messaging system
• Allows users to see availability of other users and for scheduling
Shared calendars
• Central location to find and connect with users
Contacts list
• Real-time discussion spaces for specific topics or projects
Chat rooms
Virtual meeting • Conduct video conferences and presentations online
spaces
Virtual learning environments (VLE)
What is a VLE?
• A VLE is an online platform for education and training
• Examples of online work spaces include:
o Google Classroom
o Microsoft Teams
o Moodle
Features of a VLE
Feature Description
• Allows teachers/students to keep up to date with latest posts/events
Wall or timeline
• Allows teachers to give announcements to students or classes
Notice boards
• Allows users to share audio, video, web links or files
Multimedia sharing
Quizzes or multiple • Self marking tests that are graded automatically
choice tests
• Moderated by a teacher
Communication tools
• Linked to a school or colleges management system to auto enrol
Log-in system students/teachers
62
o Forums
Features of a wiki
Feature Description
• Allow users to track edits
User accounts • Track who has made edits
Features of a forum
Feature Description
• Manage discussions and enforce rules to keep order
Moderators
• In control of the entire forum
• Manage users
Administrators
• Introduce new features
63
• Allows users to register, upload and manage content
User accounts
• Provides tools for uploading, organising, editing and sharing content
Content management system
• Allows users to add keywords to help categorise and discover content
Tags
• Allows users to express opinions on content
Ratings
• Allows users to leave messages directly on content
Comments
• Connects with other social media platforms for wider sharing
Third party integration
Social bookmarking
What is social bookmarking?
• Social booking sites give users a platform to categorise and share web documents and URLs
• Examples of social bookmarking sites include:
o Pinterest
o Reddit
65
Secondary breaches:
• Importing a copy of the original work
• Possessing or dealing with a copy of the original work
• Providing means to make copies of the original work
• Permitting the use of premises for making copies of the original work
• Provision of props/equipment for a performance of a copy of the original work
Software piracy
• Software piracy is the illegal copying and distribution of software
• Companies often take a lot of steps to prevent software piracy, some of these methods include:
o Product key / license: Often a unique string or letters and numbers supplied with the
software to activate it
o Agreement of terms and conditions: Users will be asked to click to agree to the license
agreement before being able to install the software
o Holograms: Holograms are often used on the packaging of software and they indicate that
the copy is genuine as they are too difficult and costly for pirates to implement
o Some older software would only run if the CD ROM or memory stick was physically in the
device using it
Monitoring individuals
How can individuals be monitored?
• Digital technology can be used to monitor individuals but it is a controversial subject
• Examples of how individuals can be monitored include:
o Closed circuit television (CCTV)
o Automatic number plate recognition (ANPR)
o Physical forms of identification (passports, bank cards, drivers licence etc.)
o Network activity (IP/MAC addresses)
o GPS data shared by apps
o GPS trackers
• Individuals communication can also be monitored
o Parental control software to monitor children's online activity
o Social media
o Web histories
• In the UK, the Investigatory Powers Act (2016) allows the police to access these kinds of digital
communications
66
Locate friends for social activities Energy consumption
Identify & locate potential criminals at events Making the public not feel trusted
Keeping travellers safe by monitoring events at airports/train
stations
Verifying individuals for financial transactions to reduce financial
crime
• A combination of factors,
including:
• Take regular breaks
o Poor lighting
• Have regular eye tests
Headaches o Flickering screens
• Use an anti-glare screen filter
o Reflections
o Fatigue
Worked Example
Not having uncovered drinks near a laptop is one method of reducing the risk of electric shock.
Identify two other health and safety risks of using ICT and one method of prevention for each risk. [4]
Answer
Fire [1]
RSI
Back/shoulder/wrist pain
Carpel Tunnel syndrome [1]
Online Safety
Online safety
What is the need for online safety?
• Online safety is about knowing about and using the internet safely and responsibly
• It refers to when an individual is using the internet, email, social media, online gaming
• Online safety refers to the individual knowing how to protect themselves from potential dangers
and threats
Need Description
Protects personal
Awareness that personal information should not be shared freely
information
Awareness of how to act online and how to avoid falling victim, creating a safe
Prevents cyberbullying
and respectful online environment
Guards against online Identify and avoid online scams, phishing attempts, and fraudulent websites that
scams may try to trick them into sharing personal or financial information
Ensures digital Mindful of online behaviour and interactions, protecting your digital reputation,
reputation which can have long-term consequences in personal and professional lives
Promotes privacy and Have control over privacy settings on social media platforms, allowing a limit to
control who can access/view personal information and posts
Prevents exposure to Avoid encountering explicit or harmful content online, reducing the risk of
inappropriate content exposure to inappropriate material or online predators
Secures online gaming Engage in online gaming responsibly, avoiding sharing personal details and
experiences maintaining respectful behaviour towards other players
69
Guards against Protecting devices from malware, viruses, and other online threats, preventing data
malware and viruses loss, privacy breaches, or device damage
Promotes responsible Develop responsible online behaviours, promoting respectful conduct while
digital citizenship interacting with others on the internet
Maintain a healthy balance between online and offline lives, reducing the risk of
Supports overall well-
addiction, mental health issues, or negative impacts on relationships and self-
being
esteem
How can you be safe using IT?
• There are many ways to remain safe when using technology, by following the advice and
guidance users can stay safe whilst:
o Using the internet
o Sending/receiving email
o Using social media
o Playing games online
• Know how to block and report people who send content or messages that
are unwanted
• Know where the privacy settings are to reduce the number of people who can
see your posts or images
• Be aware of the potential dangers associated with meeting online contacts face to
face, do not meet anyone you do not know, if you do, take an adult and meet
Using social publicly
media • Do not distribute of inappropriate images and inappropriate language
• Respect the confidentiality of personal data belonging to other people
• Only accept friend requests from people you know
• Parents should be aware of what you are doing online, discuss what you are
doing online
• Do not post images or details that can be used to locate you
Category Description
• The production of, using of and disposing of digital technology adds to
Carbon footprint greenhouse gas emissions
• Rare materials and resources being consumed during the manufacturing of digital
Resource
devices
consumption
• Increased use of data centres and the number of digital devices in the home
Energy use adding extra strain to power grids
Sustainability
• Energy use is a big factor in the sustainability issues caused by the use of digital devices
• Recycling
• Education
Poisonous substances used in
Natural resources • Laws
digital devices
• Harmless alternatives
Worked Example
Explain one benefit to the environment of buying previously-owned devices [2]
71
Answer
Sources of Information
What is a primary & secondary source?
• A primary source is is a source that you have created yourself
• A secondary source is a source that has been created by someone else
• Examples of primary and secondary sources include:
• Crawling is when web crawlers scour the internet daily to retrieve new websites
• Indexing is how websites are categorised based on the content of their web pages, keywords and
metadata
• Ranking is how websites are ranked and listed on search engine pages - this depends on many
factors to display the most relevant results
Feature Description
• Used to identify relevant information
Keywords
• Ways to refine your search, such as searching for:
o images
Search types o news
o location
Worked Example
Describe two ways that a user can make effective use of a search engine to select information. [4]
Answer
• 1. Use key words/terms (images/video/websites) [1] to return more relevant results [1]
• 2. Filter by images/video/websites [1] to return appropriate file type [1]
• 3. Filter date [1] to return more recent results [1]
• 4. Use search syntax (+ - “”) [1] to ensure results include/exclude key terms [1]
• 5. Filter by usage rights [1] to comply with copyright [1]
• 6. Filter by colour/size [1] to return results that are more fit for purpose [1]
• 7. Compare results [1] to look for accuracy / reliability / bias of results [1]
• 8. Use different search engines [1] as they use different processes/algorithms [1]
Using Information
Evaluating information
How can you evaluate information?
• To evaluate information you check it is fit for purpose
• To be fit for purpose you check a sources:
What to
How? Why?
check
• Check that information is from a reputable
source • Information could be:
• Does the information match other reputable o Incomplete
Accuracy
sources o False
• Does the source provide any evidence
73
• Old or now false
• Check publication date
Age • Too recent
What is plagiarism?
• Plagiarism is when someone presents information or ideas from another source as their own,
without giving credit to the original author
• This can be done intestinally and unintentionally
• They may also try to claim it as their own
• A common example of digital plagiarism is copying and pasting from the internet
• If someone uses another persons information and fails to state who it belongs to they are breaking
their rights and committing plagiarism
• To avoid plagiarism a user should rewrite or rephrases information
• This shows you have read and understood information but can put it in your own words
• To avoid plagiarism always state where the information came from, this can include the authors
name or URL it was found on
74
• Characteristics of shopping websites include:
o Product catalogue
o Basket
o Checkout
o Secure payments
Product catalogue
• When shopping online, users browse a catalogue of products
• Catalogues are often grouped in to categories to make browsing easier
• Catalogues are also linked so the user can have similar recommendations made for them during their
shopping experience
• When a customer selects an item from the product catalogue, then can add it to their basket
Basket
• A shopping site basket allows the user to be able to add multiple items or products from the store
to their basket
• It is a way for the user to keep everything in one place until they are ready to pay for their items
• Using a basket allows the user to be able to pay in full for their entire purchase in one transaction
Checkout
• When a user is ready to complete the purchase of their items, they will do this at checkout
• Checkout also allows users to
o edit delivery details
o use voucher codes
• Checkout can often ask users to sign in, or proceed as a guest on the site to complete their purchase
with ease
Secure payment
• When payment is made, shopping websites will use a secure payment method to ensure the
transaction is secure
• This will often be done by a third-party payment processor
• More information about security of websites can be found in in the revision note ' Methods of
Securing Data'
Booking System
75
What is an online booking system?
• An online booking system is a computer system that allows customers to purchases tickets for
events online
• Examples of industries that make use of these systems include:
o Travel - booking flights, hotels and package holidays
o Entertainment
▪ Music - Reserving tickets for live music events
▪ Film - Booking cinema tickets, allowing customers to pick a seat
o Leisure/sport - Purchasing tickets to sporting events, choosing their view
Worked Example
RockIT Airlines representatives use a computer booking system to book flights for customers. A
representative from the airline types in the customer reference number, the number of passengers, departure
time, departure date, departure airport and the destination airport.
Describe the processing and outputs involved in making the booking. [6]
Answer
Six of:
Banks
76
Internet banking
What is internet banking?
• Internet banking is a secure online platform for accessing and controlling a person's bank
account
• Internet banking can be accessed via the internet through a secure website or by using the banks'
official app on a smartphone
• Internet bank allows for transfers, bill payments, account management and much more
Worked Example
Zain uses an online banking service. List two features of an online banking service. [2]
Answers
The service can carry out multiple transactions simultaneously / no queuing [1]
77
Education & Training Providers
What is an education & training provider?
• An education & training provider is responsible for providing online access to learning
resources for users of all ages
• Features of an education & training provider include:
o Online support
o Online training courses
Online support
• Online support can be offered by education & training providers using methods such as:
o Communication channels
o Knowledge bases
o Additional support resources
Communication
Knowledge bases Additional support resources
channels
Email support Frequently Asked Questions (FAQ) section Video tutorials
Live chat Tutorials & how-to guides Webinars
Discussion forums Glossaries Downloadable resources
Online training courses
• Online training courses allow learners to access:
o Online journals and reference archives
o Online support from teachers and other learners
o Learning and assessment materials
• Online training courses are often accessed through a virtual learning environment (VLE) - link to
VLE in online communication page
Gaming Sites
What are gaming sites?
• A gaming site is an online application that hosts a game on a remote server for users to play
• Sometimes these games are multiplayer
• Gaming sites offer features that:
o Enhance the gameplay
o Build a community
Leader boards - allow users to track progress and compare with others
Cloud saves - save game progress online, ensures no issues if a user changes
Enhance the
devices
gameplay
Microtransactions - small, in game purchases allow users to personalise characters
(cosmetics)
78
Voice chat - allows users to communicate directly with other users whilst in the
game
Livestreaming - allow users to stream gameplay so that other users can watch and
interact
Entertainment Providers
What is an entertainment provider?
• An entertainment provider is an online platform that provides access for users to digital media
• Digital media can be accessed:
o On demand
o Streaming
o Offline (downloaded)
79
• Focus on continuous playback via playlists or content with multiple episodes
• Many platforms offer a mixture of these methods so that a user has total flexibility
• Examples of such platforms include:
o Netflix
o Spotify
o Prime video
Lifestyle
What is the impact on peoples lifestyle?
• The impact on peoples lifestyles is evident from the availability of online goods and services
• The availability of online goods and services saves people time
• Availability brings positive impacts on lifestyle areas such as:
o Grocery shopping
o Travel booking
o Banking
o Learning
o Information providers
Lifestyle Benefits
Convenient - Place orders at any time, from anywhere
Comparison - Compare prices and deals across different stores within a few clicks
Travel booking Flexible - Make changes to bookings easily, find last minute deals
Learning Personalised - All learning styles catered for, adaptive platforms adjust to your pace
Choice - Access to more subjects & topics that can be found in a traditional classroom
80
Speed - Instant access, no more waiting
Information
providers Variety - Access to a wide variety of information, from different view points and
perspectives
• The availability also has some drawbacks, such as users becoming:
o less patient and more demanding
o more isolated
o more concerned with checking online communication and reduce their face-to-face
communication skills
o prone to skim reading online content and are less likely to pay attention to detail
Worked Example
Rose likes to listen to music
Explain one benefit to Rose’s lifestyle of being able to listen to audio streamed online, rather than
downloading it. [2]
Answer
She can listen to music on the go [1] because streaming does not require bulky storage [1]
OR
She can listen to audio from any device [1] because it is stored on a server [1]
OR
Streaming lets Rose get the latest news [1] because a live recording can be broadcast [1]
Transactional Data
What is transactional data?
• Transactional data is data that is sent between two connected digital devices on the internet
• This data is stored in cookies
• Cookies are information left on a users device so that a website can recognise the user when they
visit again
• Encryption is used when transmitting cookies
• Data stored in a cookie includes:
o Time & date of the transaction
o IP address
o Data on products or services that a user has previously viewed/purchased
o Items added to a shopping cart
o Buttons pressed
o Data entered in to web forms
• There are three types of cookies
81
• Remembering login details for future
• Stored on a local storage device
visits
Persistent • Have an expiration date set by website
• Tracking browsing history
cookies (days to years)
• Delivery of targeted advertising
Targeted marketing
• Targeted marketing is when third-party cookie data is used to match people based on browsing
history or personal attributes
• When a user visits a website that uses an ad server, the adverts will be specific to the users third-
party cookie data
Worked Example
Rose purchases a smartphone online.
Describe two ways in which transactional data could be used during a purchase [4]
Answer
Products selected / purchase history / sites visited [1] could be used to suggest related products/services [1]
OR
OR
82
Online services
Advantages Disadvantages
Convivence - No travelling, can use anytime, anywhere Security - Online scams, fraud and data breaches
Returns & exchanges - Inconvenience caused
Selection - Access to wider variety of options
when needing to return items, especially bigger
(local/national/international)
items
Competitive prices - Online stores typically have lesser Delayed gratification - Have to wait for items, can
costs so can be very competitive with prices be frustrating
Reviews & ratings - Read customer reviews and see Limited customer service - Impersonal or
product ratings before purchasing difficult to reach comparted to local businesses
Local services
Advantages Disadvantages
Limited selection - Smaller selection compared to
Immediate gratification - No waiting for deliveries
online
Inspecting products - Can check before purchasing Higher prices - Higher overheads lead to higher prices
Travel & time - Inconvenience/extra cost caused by
Easier returns & exchanges - Easier in person
travelling and waiting
Supporting local economy - Supporting local
Limited access hours - Limited opening hours
businesses/communities
Cloud Services
What is the cloud?
• The cloud is a word used to describe the use of the internet to:
o Store data
o Access software
• Data & software accessed locally are confined to the resources of the specific device you are using
• Data & software accessed using the cloud rely on an internet connection
83
• Low bandwidth (slow internet)
Features that enable collaboration Not as many features as locally installed software
Updates & security managed by someone
Privacy concerns, who has access to your data
else
Cost effective (pay monthly plans) Hidden fees can add up
Online & local storage
What is online storage?
• Online storage (cloud storage) is a term to describe long-term (secondary) storage of data that
resides in a remote location, accessible only via a wide area network (Internet)
• Data is stored on remote servers, typically using magnetic storage (HDD), but increasingly using
solid state (SSD)
• The three types of online storage are:
o Public cloud - The customer and the cloud storage provider are different companies
o Private cloud - The customer and the cloud storage provider are a single organisation
o Hybrid cloud - Combines both public and private cloud options and allows for sensitive data
to remain private whilst providing public cloud services for less sensitive information
Allows customers to increase or decrease their Should the company dissolve or cease to exist, all
storage capacity as needed cloud data may be lost
Providers often use multiple servers to store and As the amount of storage or bandwidth required
backup data, reducing the risk of data loss due to increases, the service may become expensive over
hardware failure time
Worked Example
Explain one drawback of using cloud storage to back up a digital music library [2]
Answer
• Uploads will take a long time [1] because bandwidth is limited / file sizes are large [1]
• Increased cost [1] as data often charged per Mb used [1]
84