Singapore International School
Introduction to ICT: Key Concepts, Devices, and Internet Technologies for Grade 8
1. Understanding the Internet and Data Transmission
• The Internet:
o A global network of interconnected computers that communicate using the
Internet Protocol (IP).
o Allows devices to connect and share information worldwide.
• Data Transmission:
o Data is sent over the internet in small packets, each containing part of the
overall data.
o TCP/IP Protocol:
TCP (Transmission Control Protocol) ensures data is sent and
received correctly by breaking it into packets and reassembling it at
the destination.
IP (Internet Protocol) handles the addressing and routing of
packets to ensure they reach the correct destination.
o Packet Switching:
Data is broken into packets and sent through the network using the
most efficient path. If a part of the network is congested or fails,
packets can take alternative routes.
• IP Address:
o A unique identifier assigned to every device connected to the internet.
o It can be static (permanently assigned) or dynamic (temporarily assigned by
the network).
• Domain Name System (DNS):
o Translates human-friendly domain names (like www.google.com) into IP
addresses that computers use to identify each other on the network.
2. Introduction to Cloud Computing
• What is Cloud Computing?
o The delivery of computing services (servers, storage, databases, networking,
software, analytics, and intelligence) over the internet ("the cloud").
o Allows for on-demand access to resources without direct active management
by the user.
1|Pa ge Engr. Kabir
Singapore International School
• Benefits of Cloud Computing:
o Cost-Effective: Reduces the need for expensive hardware and software
investments.
o Scalable: Easily scales up or down based on business needs.
o Accessibility: Accessible from any device with an internet connection.
o Collaboration: Enhances collaboration by allowing multiple users to work on
the same document or project simultaneously.
o Security: Provides data backup and disaster recovery solutions, often with
better security than on-premises systems.
• Examples of Cloud Services:
o Infrastructure as a Service (IaaS): Provides virtualized computing
resources over the internet (e.g., Amazon Web Services).
o Platform as a Service (PaaS): Offers hardware and software tools over the
internet (e.g., Google App Engine).
o Software as a Service (SaaS): Delivers software applications over the
internet (e.g., Microsoft 365, Google Workspace).
3. Introduction to Encryption and Data Security
• What is Encryption?:
o The process of converting data into a coded format to prevent unauthorized
access.
o Encrypted data is called ciphertext, and the process of converting it back into
readable format is called decryption.
• Importance of Encryption:
o Confidentiality: Ensures that sensitive data cannot be read by unauthorized
parties.
o Integrity: Helps detect if data has been altered during transmission.
o Authentication: Verifies the identity of the sender and receiver, ensuring
data is sent and received by the correct parties.
o Compliance: Many laws and regulations require encryption for certain types
of data, such as personal information and financial records.
• Types of Encryption:
o Symmetric Encryption: Uses the same key for both encryption and
decryption. Faster but less secure if the key is compromised.
o Asymmetric Encryption: Uses a pair of keys—a public key for encryption
and a private key for decryption. More secure but slower.
2|Pa ge Engr. Kabir
Singapore International School
• Common Encryption Protocols:
o SSL/TLS (Secure Sockets Layer/Transport Layer Security): Used to
secure communication between web browsers and servers.
o AES (Advanced Encryption Standard): Widely used for securing sensitive
data.
4. Data Storage and Backup
• Data Storage:
o Refers to the methods and technologies used to store digital data.
o Common storage devices include Hard Disk Drives (HDDs), Solid-State Drives
(SSDs), USB flash drives, and cloud storage services.
• Data Backup:
o The process of copying and archiving data to prevent data loss in case of
hardware failure, accidental deletion, or cyber attacks.
o Types of Backup:
Full Backup: A complete copy of all data.
Incremental Backup: Only copies data that has changed since the
last backup.
Differential Backup: Copies all data that has changed since the last
full backup.
• Importance of Regular Backups:
o Protects against data loss from hardware failures, malware, accidental
deletion, and natural disasters.
o Critical for business continuity and disaster recovery plans.
5. Introduction to Cybersecurity
• Cybersecurity:
o Protecting systems, networks, and data from digital attacks.
o Common Cyber Threats:
Malware: Malicious software designed to damage, disrupt, or gain
unauthorized access to computer systems.
Phishing: A method used by cybercriminals to trick people into
providing personal information through fake emails or websites.
Ransomware: A type of malware that encrypts a victim's data and
demands a ransom for its release.
3|Pa ge Engr. Kabir
Singapore International School
• Best Practices for Cybersecurity:
o Use strong, unique passwords for different accounts.
o Enable two-factor authentication (2FA) where possible.
o Regularly update software and applications to patch security vulnerabilities.
o Be cautious of suspicious emails and links.
o Regularly back up important data.
6. Using ICT Responsibly
• Digital Citizenship:
o Involves using technology in a safe, responsible, and ethical manner.
o Key Aspects:
Respect for others online, including being aware of cyberbullying.
Protecting personal information and privacy.
Understanding the impact of digital footprints.
• Online Safety:
o Do not share personal information with strangers online.
o Be aware of the risks associated with social media and online gaming.
7. Computer Devices
• Input Devices:
o Devices used to enter data into a computer.
o Examples:
Keyboard: Used for typing text and commands.
Mouse: A pointing device used to interact with items on the screen.
Scanner: Converts physical documents into digital format.
Microphone: Captures audio input.
• Output Devices:
o Devices that display or produce the results of computer processing.
o Examples:
Monitor: Displays visual output from the computer.
Printer: Produces physical copies of digital documents.
Speakers: Output sound generated by the computer.
4|Pa ge Engr. Kabir
Singapore International School
• Storage Devices:
o Devices used to store data for long-term access.
o Examples:
Hard Disk Drive (HDD): A traditional magnetic storage device.
Solid-State Drive (SSD): A faster, more reliable storage device with
no moving parts.
USB Flash Drive: A portable storage device used for transferring data
between computers.
Cloud Storage: Online storage service where data is stored on
remote servers and accessed over the internet.
• Processing Devices:
o The components of a computer that process data.
o Examples:
Central Processing Unit (CPU): The brain of the computer that
performs calculations and executes instructions.
Graphics Processing Unit (GPU): Handles rendering of images,
video, and animations, especially for gaming and graphic design.
• Networking Devices:
o Devices that enable computers to connect and communicate within a network.
o Examples:
Router: Directs data packets between different networks and
manages traffic.
Modem: Converts digital data from a computer into a format suitable
for a transmission medium.
Network Interface Card (NIC): Allows a computer to connect to a
network.
5|Pa ge Engr. Kabir