Btec IT Student Book
Btec IT Student Book
Digital devices 1
A digital device is an electronic device that uses digital data (such as 1s and 0s) as opposed to analogue
data (such as a sound wave). Here are five commonly used types of device that you need to know about.
Multifunctional devices
These devices can perform multiple functions, such as
inputting and outputting data.
An example is a touch screen, which outputs an image while
allowing the user to input data by pressing the screen or a
multi-functional printer.
Personal computers
These are small and inexpensive computers for use by
individual users.
Examples are desktops and laptops, which are more
portable and have a built-in battery, screen and keyboard. Force feedback game controllers
are multifunctional devices – they
can input data and output vibration.
Mobile devices
Smartphones and tablets are made with
portability in mind to give people computer and
internet access while on the go.
Servers
These powerful computers provide services to
other computers connected to a network.
Web servers store web pages An example is a mail server that provides access
and online content, and serve to email services for all the users on a network.
data to users over the internet.
For more on
Links
networks,
see page 17.
Entertainment systems
These are devices for watching Games consoles
TV/films (such as satellite or are entertainment
cable digiboxes), listening to systems with
music and playing video games. powerful graphics
processors that
allow users to play
video games.
Concentrate on
Nadeem’s requirements,
Nadeem wants to access the internet while he is travelling to college by train. and the features he
most needs when using
(a) Give a type of digital device that would be appropriate for Nadeem to use.
a device while out of
(b) Explain two reasons why the device you chose is appropriate for Nadeem’s the house, on a train.
requirements.
Digital devices 2
Digital devices are often developed to make everyday tasks easier, quicker or more cost-effective and
to provide efficient, improved access to data. There are four types of digital device that you need to
know about.
J P Lucy is a chain of small department stores, with five branches. Questions with the command word
‘state’ don’t require long answers.
State two different data capture and collection systems that might
You can give your answer using single
be used in the department stores.
words or short sentences.
Distance
learning Playing
Classroom teaching
degrees video games
– interactive Watching
whiteboards (IWBs) digital TV
Internet
The ability to access learning Virtual learning Personal banking
materials, submit work and environments
communicate with tutors (VLEs)
electronically makes e-learning Education and Operating
a fully interactive experience. training home systems
Output devices
Device Features Example uses
Monitor Outputs an image to the user, e.g. of the user • Viewing the user interface
interface, a photo or a document. • Watching movies
Projector Outputs an image onto a wall or screen
Printer Produces hard copies of digital documents and • A hard copy of a report
images on paper. • Printing digital photos
Plotter This specialist type of printer draws to a very • Drawing vector graphics
high quality on very large paper.
Speakers Amplify analogue signals (sound waves) sent • Listening to music
from the sound card for the user to hear. • Listening to someone during a VOIP
Headphones A portable alternative to speakers. call
Accessibility devices
Adaptive technologies
Some peripheral devices are
specifically created to allow These are technologies that
accessibility for people with have been designed specifically
disabilities. For example: to aid people with disabilities.
They include both hardware
• trackball – an easier-to- and software.
use alternative to a mouse,
consisting of a moveable
ball on a base Peripheral devices such as
• touch screen or large a trackerball or eye motion
key keyboard – useful for sensors are hardware –
people unable to use a they are physical items that
keyboard easily you can touch.
• eye motion sensors and
head motion trackers There are also many types
of software available to aid
– used by people with accessibility, such as voice
significantly limited mobility recognition software for input
• Braille embosser – a type and screen reading software
of printer that outputs text for output.
as Braille cells (characters).
Storage devices
Storage devices are a type of peripheral device used for storing, backing up and sharing data, usually
for individual use where a network is not available.
Networking
Operating systems simplify networking in a
computer. The operating system implements a 7 Application
number of networking technologies such as:
• the TCP/IP stack 6 Presentation Application
• network utility programs like traceroute
• device drivers for the network interface card. 5 Session
tocols used
The TCP/IP stack is the set of pro 4 Transport ← TCP → Transport
rnet. The data
for transmitting data over the inte
(or steps).
transmission takes place in layers
TCP /IP stack links 3 Network ← IP → Internet
The diagram shows how the
stan dard model
to the OSI model, which is the
ork.
used to explain how computers netw 2 Data link
Network
interface
1 Physical
For more on traceroute,
Links
see page 10.
OSI model TCP/IP
User interfaces
The user interface is a core part of any operating system. It allows the user to interact with the
computer system and is the part of the software that has a huge impact on a user in terms of useability.
Utility software
Utility software is used to manage system resources. Utilities are like a tool box to help us optimise and
maintain our computer system. Many utilities are pre-installed as part of the operating system, such as
traceroute, while others may be selected by the user and installed, such as anti-virus scanners.
Disk utilities
Disk utilities are designed to maintain the performance of a computer’s disk drive.
File compressors – backing up very large files and sharing them online can be difficult. This utility
compresses files to reduce their size and decompresses them for later access.
Backup – you regularly want to back up your files, but this can be slow as a manual process. Backup
utilities allow you to automate the backup process.
Disk defragmenter – over time a computer’s disk drive becomes fragmented, which slows down file
access. This utility reorganises the data for quicker access, but is only required on a HDD when using
Windows (fat32/NTFS) file systems.
Network utilities
Network utilities are designed to maintain good
network traffic and keep networks secure.
Firewalls – open networks are at risk from
threats like hackers and worms. Firewalls prevent
unauthorised access by monitoring and blocking
suspicious traffic.
Anti-virus – this utility prevents computers
from receiving viruses and detects and removes
viruses that have already infected a system.
Other utilities
There is a huge range of utilities which do not fall
under a particular category.
Registry cleaners are designed for Windows
systems to remove old, redundant registry entries.
This can help improve system performance.
System profilers display a detailed breakdown of the
system, including hardware and software. This can
help with deciding where a system needs upgrading
and diagnosing problems with the system.
System monitors monitor resources and
performance of PC systems. They help identify
the causes of poor system performance.
10
File types
Different file types are used to denote the form, or structure, of the data stored within the file. The
file extension tells the user what type of data the file should contain. It also tells the operating system
which icon to display and which software to use to open the file when the user double clicks the icon.
11
Application software
Application software allows end users to complete tasks, such as creating a report or a presentation.
12
Emerging technologies
Emerging technologies are those that are currently in development and are just starting to make an
impact on business and general society.
At work
Artificial Biometrics are increasing security at airports Virtual reality is
intelligence through facial recognition at passport checks. allowing businesses
used in business to test products
forecasts is Robots are performing dangerous jobs without risk under development
helping in decision to life. They can then carry out routine production in a virtual
making. line tasks, as well as delicate surgical procedures. environment.
13
Choosing an IT system
There are many factors to consider when choosing the best system for the end user, ranging from what the
system needs to be capable of doing to how the user interacts with it and what devices make up the system.
Does the system meet the Will the system Can the IT system use the required
specification requirements work with other connectivity technology. e.g. for using mobile
of the software to be used? devices? internet connections or syncing devices?
Does the user have a large budget, Do they have a small budget
Cost allowing you to choose components which requires looking for a
from well-known brands? cheaper alternative?
Implementation
What is the Does the Will the Will you need to Will users need
timescale for the system need system need migrate data from training in order
IT system to be to be available extensive an old system to to use the
implemented? quickly? testing? the new one? system?
15
16
DATA CENTRE
Local area networks
Client Client Client often use UTP/STP
cabling in order to
connect the devices,
Ethernet
although WiFi can be
used for a wireless
LAN. Internet
Router/Switch
Printers Servers
Switch Router
The network allows The router might
resources like printers, connect the LAN to
files, internet and the internet or, in A WAN is a computer network that
software to be shared this case, to a WAN. covers a large geographical area
by all the computers
on the LAN. such as a country or the whole world.
WAN
Smartwatch
For a diagram of a
Bluetooth is commonly used to create a PAN to connect Links
VPN, see page 20.
all the digital devices in a person’s workspace, for
example connecting a mobile phone to a Bluetooth
headset for hands-free operation.
17
Productivity
Factors affecting choice of cabling (copper,
fibre, DSL), and
Is it suitable for the location
intended purpose, e.g. able
to support speed required Cost
for video editing? ongoing costs (Total
Cost of Ownership,
or TCO)
Efficiency
Implementation (timescales,
performance, expansion
testing, downtime) Compatibility
room, expected
limiting factors manufacturer, standard,
utilisation
schedule limitations interoperability
18
Protocols
Protocols are the rules that define methods of communicating data between two or more digital
devices. They ensure that the transmission of data always follows a set procedure. There are different
protocols for different applications.
TCP/IP
Transmission Control Protocol and Internet Protocol are used together as the basic communication
language of the internet.
Data sent over the internet is broken up into ‘packets’ to enable it to be sent more efficiently. Each
packet is sent individually and then re-assembled at the destination.
• TCP is used to create the packets and
reassemble them at the end.
Have a look at the diagram of
• IP is used to route packets to the intended Links
the TCP/IP stack on page 8.
computer, using the computer’s IP address.
19
Compression Codecs
Compression reduces file size so files can be transferred A codec is a program used to
faster. Compression is used for images to be displayed compress and decompress video and
on the Web, video and audio in streaming and VOIP, and audio files. This reduces the space they
documents attached to emails. There are two main types of take up on disk and allows fast transfer
compression. over a network, such as the internet,
• Lossy – data removed during compression is permanently for VOIP calls and online streaming.
deleted. Commonly used in images, audio and video. This leads to a loss of quality in the
• Lossless – all original data can be recovered when video or audio – in the resolution,
uncompressed. Commonly used for documents. frames per second or both.
Joanna is a big fan of online video games. She is currently experiencing a lot of Make sure you
skipping. She has a high bandwidth connection and thinks the problem is the latency. relate your answer
to the context of
Describe how bandwidth and latency would affect Joanna when playing video games. video gaming.
20
Uses of …
cloud storage cloud computing
Personal use Personal use
• Storing files such as photos and • Accessing graphics editing
videos online, so they are synced and software, email and home office
accessible on all the user’s devices. software on a variety of home
Professional use computing devices.
• Storing off-site backups of business Professional use
data, to allow recovery in case of loss • Accessing office applications and
of data. email without having to install the
• Accessing business documents while software on all workstations.
working off-site.
on individuals on organisations
Advantages Advantages
Data can be accessed on the wide Off-site backups are more physically secure (e.g.
variety of devices used in the home. safe from fire).
Software with specification A business can subscribe and unsubscribe to
requirements that are too high for a home software according to changing needs.
computer can be easily accessed through Organisations can save money as IT staff are not
cloud computing. needed to manage software installations and less
Disadvantages powerful hardware is required.
Cloud storage and computing can make Disadvantages
heavy use of bandwidth. Organisations have no control over the security
Hackers could access and misuse of their backups, as that is controlled by the cloud
personal photos or videos on the cloud storage company.
storage servers. Privacy concerns over who can access the
organisation’s data within the cloud storage company.
Software is inaccessible if there is a network outage.
21
Cost
Security
There is a great range in the costs for online services. Many
Online systems create cloud storage services are free of charge to individual users up
security concerns as data is to a certain data limit, but charge monthly fees for businesses.
accessible over the internet, There are free services available to organisations, which can
potentially to hackers, and save a lot of money, such as Google Drive (although if you
you have little control over want to impose things like corporate control and policies,
security procedures. costs are involved).
If security is important,
choose an organisation that
implements high security
protocols.
Features
Cloud software sometimes has fewer features than
a locally installed version. However there are a wide
Ease of use range of options available, as cloud services allow
users a lot of choice to find a suitable product.
Some online services are easier for
non-technical users than others.
Cloud storage systems often sync
your data with your computer,
allowing you to access your cloud
files using the same interface as for Connectivity
your local files. Cloud-based storage and software require internet
Also check on the amount of connections in order to access the services.
technical support available to users. You may be limited in your options if your internet
connection is slow or you have a limited data
allowance.
Remote working
Online systems allow people working from home,
or anywhere outside the office site, to access
the network of the organisation they work for.
Systems that help with this include:
• VPN – allows a secure connection to be
made to the organisation’s network over the
internet. Remote desktop
technology –
• Remote desktop technology can also be
used to fix computer problems remotely, and is allows a user to
often used by technical support departments log in to and use
For more on VPNs, see
to promote a more effective way of working. their work system Links
pages 17 and 20.
from a remote
device.
22
Online communities:
methods of communicating
An online community is a group of people who communicate over the internet about common interests.
We use a wide variety of different online services to form and participate in these online communities.
Here are six commonly used types of online community.
Podcasts Forums
Also known as a message
board, a forum is a website
Podcasts are audio (and used for online discussion
sometimes video) files where users can post messages
posted to the internet for and questions publicly for other
download. They are normally users of the site to read and
produced as a series on respond to.
a particular topic. People Forums are usually based
interested in the topic can on a topic of interest, such
subscribe to the podcast to as technology or particular
get the latest episode. hobbies.
23
Online communities:
implications
Both individuals and organisations make extensive use of online communities. This has had many
implications on how we live our lives and how we work. Many are positive but some are negative.
Privacy Cost
• Personal information accessible by other users. • Usually free for users to make use of.
• Can be misused by others, such as for • Users need to accept advertising.
cyberbullying.
User experience
• Ease of use – services often offer
Meeting needs sophisticated features but are
• Allows users to communicate nevertheless intuitive and accessible.
with others, organise events, • Accessibility – can provide
etc. companionship for individuals isolated
due to a disability or other personal
circumstances.
Security • Performance – can be used on a range of
For devices effectively. A lot of communities
• Danger of accounts being
hacked and data stolen. individuals have dedicated apps to target lower
• Information could be used for powered devices
identity and bank fraud. • Availability – being able to use offline or
with limited connectivity is a challenge.
IMPLICATIONS Cost
Customer needs
• Communicating with customers OF ONLINE • Maintaining a presence through
is easier. COMMUNITIES online communities is usually cost
• Easier communication helps a free, although additional paid for
business understand customer services are available (for example
needs better. direct marketing).
• Implementing own system has
Security
For large development costs.
24
Examples of threats
Malware Viruses, worms, trojan
s
This is software designed to cause harm to
to data and systems and spyware are all
examples of malware.
your IT system, such as deleting, altering or Remedy FREE edition virus software ?
+
stealing data.
Threat Detected!
Hackers While opening file: C\Documents and Settings\Emma\Desktop
\MusicMan.EXE
A person who exploits weaknesses in IT Trojan horse BreakOut.Feralpoint8.PUM
systems in order to gain unauthorised access ? Ignore Info Heal Move to vault
is known as a hacker. This can be done to
steal, alter and delete data from your system.
(There are also ‘ethical hackers’ who are
employed by companies to test defences RELYBank
and security.)
Dear Sir/Madam,
We would like to notify you that an attempt has been made,
Phishing within a country other than the UK, to withdraw the amount of
€560.00 from your account.
A phishing email is one that pretends to be
If you did not make this withdrawal, someone else may have
from a reputable company in order to get gained access to your account, and we need to verify your
individuals to reveal personal information. personal details. Please click on the link below to report this
withdrawal as incorrect and to confirm your personal details.
We aim to resolve any discrepancies within 10 days.
Accidental damage Thank you for choosing to bank with RelyBank.
Not all threats to individuals and businesses Member FDIC ©2010 RelyBank Ltd
are malicious.
A lot of damage is caused through human A common phishing email claims to be from a bank.
error, such as accidentally deleting or It instructs the user to click on a link and enter their
overwriting files on a computer, or spilling a bank details, supposedly for verification purposes,
drink on a device and damaging it. but really to steal the person’s bank details.
Protecting data:
tools and techniques
There are many tools and techniques we can use for protecting data stored and transferred using IT
systems. Software and hardware tools are one important approach, as well as techniques and processes
for limiting access and securing data.
Physical access
Digital certificates control
Protocols
Allow secure data Prevent unauthorised
Define data transfer
transfer using public Biometric authentification
processes to ensure access using locks,
key encryption. identifies individuals’
secure transfer. biometrics, etc.
unique fingerprint patterns.
26
Protecting data:
legislation and codes of practice
Data protection is supported through legislation. Non-compliance is very serious and can be punished
with large fines and imprisonment.
Codes of practice
When data protection fails
Professional bodies and the Information
In 2007, families in the UK were informed of a Commissioner’s Office (ICO) define codes of
potentially massive fraud alert. This happened after practice for how organisations handle, share
two computer discs which held the personal details and protect data.
of all UK families with a child under 16 went missing.
Codes of practice are not legal requirements
The Child Benefit data included name, address, – they are best practice guidelines, which
date of birth, National Insurance number and, in aim to:
some cases, bank details of 25 million people and
7.25 million families.
• help support compliance with the Data
Protection Act, Computer Misuse Act and
On behalf of the government, other related legislation.
the then chancellor, Alastair • ensure data is not mishandled, which
Darling, issued an apology and would lead to a negative impact on an
an emergency statement in which organisation’s reputation
the incident was described as a
• give individuals confidence that the data
‘catastrophic’ failure. they supply to organisations will be safe.
27
28
29
Online Allows very specific targeted marketing based on users’ browsing habits.
advertising Very cost effective, with a variety of payment methods, such as cost-per-
click, cost-per-impression and cost-per-lead.
Difficult to choose the best site for your adverts from the huge choice.
Lisa runs a small cake company that specialises in bespoke cakes for both personal and corporate
customers. At the moment, she doesn’t use computers at all and estimates the cost of each cake.
Describe two ways that Lisa could use IT systems to help her develop her business.
30
Impact of IT systems on
organisations
The potential of IT systems to enhance and improve businesses is obvious but there are many things to
consider before embarking on the introduction of new IT systems in any organisation.
Impact of IT systems
User experience – does technology enhance what the users already do?
• Will it be easy to use and intuitive?
• Will the system increase performance and be reliable and available as users expect?
• What about users with additional needs?
Employee/customer needs – are people more productive and feel that the technology is
helping them (or hindering them)?
• Losing touch – are businesses losing that personal touch in the quest for ever more
efficient working?
• Big Brother – do customers and employees feel ‘monitored’ in a negative way?
Cost – how much is it going to cost, can this be related to the benefit received?
• Ongoing costs – maintenance, redundant systems
• People costs – training, skilled technical personnel
Implementation – how long might it take to put into place? How is the ‘changeover’
going to happen?
• Timescales and downtime – how long is it going to take? Is there a Plan B? How is
downtime of existing systems (ways of working) going to be minimised?
• Testing – how is the system going to be tested thoroughly? Who is testing and how?
Replacement/integration with current systems – where does a system fit into the
bigger picture?
• Will it work with existing systems?
• What about existing data? Customer records, sales records, financial records
Productivity – how does a system help a business meet its goals more effectively?
• Automation – reduce ‘human error’, increase efficiency
Working practices – what impact will it have on ways of working, people, processes?
User support and staff training needs (initial and ongoing) – is there a cost to train
and upskill staff?
• Staff culture – how will staff accept new IT systems?
• Staff skillsets – does the level of technical and support expertise required change?
Security – how is sensitive data protected? Is it secure?
• Compliance with new legislation
• Public relations risk of data breaches
31
Gathering data
Organisations need to gather data for a wide variety of reasons. One of the most common reasons is to
find out what their customers want and what they are prepared to buy.
Haldtech Ltd is developing a new product in order to enter the mobile computing market. It needs to find out
what its potential customers are looking for.
Analyse two primary sources of collecting data that Haldtech Ltd could use in order to find this out.
32
Processing data
Data is invaluable to organisations and individuals. It is used to make decisions, spot trends, gain
competitive advantage and to monitor progress. It is at the heart of a modern company.
33
Sep Source
2016
Quote Date Other
Aug Existing Customer
Jul Advertisement
Jun
May
+− 0 5 10 15 20 25 30
Businesses that can identify trends quickly and easily are TOTAL
the ones which stay ahead of the competition. The more 700000
data available, the more accurate and valid the trends 600000
500000
should be. 400000
300000 Total
This analysis of trend data allows an organisation to plan things like staffing and
stock. More detailed data allows for more detailed predictions. It may be that
sales of certain products peak at certain times of year.
A ‘pivot chart’ could combine sales data and cross reference sales per month
with individual product lines to identify which lines perform well or not at
different times of year. Pivot charts are excellent at combining massive data
sets to compare two (or more) variables.
34
Tabular data – tables can be formatted, Graphical data – a variety of formatted charts to
sorted and searched to produce outputs. present information in an easy to interpret format.
35
36
Privacy Accessibility
Privacy can be compromised by IT systems. Many New IT systems should be accessible to people
of us use social networking sites, blogs, online regardless of disability.
messaging, email and a wide variety of other Inaccessible systems cause upset and stress,
services to share large parts of our lives online. and can deny people with disabilities access to
The growth of services, such as location aware work, services and leisure facilities.
targeted advertising and software, blurs the lines
between our online and offline worlds.
The misuse of this information can have severe Links For more on accessibility
see page 39.
negative impacts. Cyberbullying, identity theft
and bank theft are examples.
37
Legislation protecting
users and data
You need to know about the role and implications of the main UK legislation for protecting data and users.
38
39
Number of marks
Practising for the exam
In total there will be 90 marks available.
Each question will identify the number of
marks available in brackets. Questions Using practice questions
can be worth up to 12 marks. The number is a great way to revise.
of marks indicate the amount of time you You can use the questions
should spend on each question. in this book, the Revision
Workbook and the sample
1 mark = 1 minute 20 seconds
materials provided by the
The amount of writing space available Awarding Body to really
will also give you an idea of how much get used to the types of
detail is needed in each of your answers. questions you’ll be asked.
However, you will be able to request
extra paper if you need it.
State two different factors that must be considered Look at page 14 to revise IT
when choosing IT systems for the workplace.
Links
systems in the workplace.
40
Long-answer questions
Up to half the marks in the Unit 1 exam can be assigned to long answer questions (worth 10–12 marks).
Evaluate the implications for the firm of using online communities (for
practice purposes, you can just plan your answer using bullets). If time is tight, you could
list positive and negative
To revise online This is an ‘evaluate’ question, so implications and then write a
Links make sure you finish with a conclusion concluding summary paragraph.
communities
see pages 23–24. or recommendation for the firm.
42
Short-answer questions
Short answer questions, with command words such as identify, name, state or give want you to give
factual information. Answers normally only require a single word or short sentences.
To revise
Adeel has been hired as a graphic designer and his manager has
Links
input devices
asked him what input devices he will need to complete his work. see page 4.
Give three input devices that Adeel will need.
43
‘Draw’ questions
If a question asks you to draw something, you need to demonstrate your understanding by producing a
diagram or a flowchart.
A bank uses a registration form in order to allow its customers to sign up for its
online banking services. The registration form asks for the following information.
Field name Field length Data type
Account number 8 Number Make sure your
drawing includes
First name 25 Text
all the data entry Your user interface
Last name 25 Text fields shown in could also include:
Date of birth N/A Date/Time the table. • instructions for
Email 64 Text the user on how
Password 12 Text to complete the
form
• appropriate
Draw a suitable user interface for the bank registration form. 6 marks
methods to help
extract the user enter
Sample response their details,
Validation – 8 characters
such as date
My Bank plc long, just numbers picker/calendar
for DOB,
Online banking registration form
This can be found on your Validation – Max 25 input mask for
latest bank statement characters long password, etc.
Please enter your existing account number
e.g. John Use date selector –
• an accessibility
Please enter your name Forename
Surname e.g. Smith Must be in the past feature, such
as the ‘Listen
Please enter your date of birth dd/mm/yyyy
Validate – Must be of the to this page’
Please enter your email address example@mybank.com format <something>@ feature
Please enter a new password
<something>.<something> • a submit button.
Please re-enter a new password Validate – At least 6
Passwords must be between 6 and 12
characters long with a mix of letters and characters and less than 12
numbers
Validate – equal to first
password field
44
‘Explain’ questions
Questions that ask you to explain want you to show that you understand the subject and can give
reasons to support a view or argument.
extract
Sample response
This learner has briefly described
Wiretech Ltd would benefit as their customers two different benefits of using
would be able to access help and advice communities. However, they have not
online, and they would be able to promote explained how the benefits would be
their products online. realised and affect WireTech Ltd.
se extract
Improved respon
WireTech Ltd could make use of social media
This is a much better answer. The learner
to build up a following of previous customers,
has clearly explained how each method
therefore being able to respond to their
identified could be used by WireTech Ltd
queries. This would benefit WireTech by
and what benefit it brings.
being able to be more easily aware of their
customers’ needs and being more acessible
to their customer base. WireTech might also To revise online communities,
provide a blog, or podcasts where they keep Links
see pages 23 and 24.
customers and potential customers up to date
with the company and its products, allowing
customers to develop an affinity with the
company and potentially boost future sales.
45
‘Analyse’ questions
Questions that ask you to analyse a topic want you to look into the topic in detail. Break the topic
down into its parts and look at the relationship between the parts. This might involve discussing the
advantages and disadvantages of possible issues or solutions, but you won’t usually be expected to
give a conclusion.
To revise utility
Links
software, see page 10.
46
‘Evaluate’ questions
If a question asks you to evaluate you need to look at all sides of an argument in order to provide a
well-supported judgement on a topic or problem. This normally includes writing a supported conclusion
or a recommendation for a solution.
extract
Sample response There are a wide variety of pros and
cons to cloud computing.
Cloud computing would be helpful to the law firm for a
While it is important to mention a
number of reasons. Firstly, cloud computing software
range of these, it’s more important
doesn’t put a high demand on the computer’s CPU
that you are able to clearly explain
and RAM as it runs on the host’s server not the local
the ones you cover in some detail.
computer. This will be very helpful as the law firm is using
older computers that might not have a high enough
specification to be able to run the latest desktop
productivity software. Make sure you relate the pros and
Another benefit is that cloud computing supports cons to the case study of the law
collaborative working.The firm’s employees can easily work firm, as this learner has done.
on the same documents using cloud computing as they can
share access to the files easily.
A disadvantage of cloud computing is that if the firm loses
its internet connection, or if the servers of the cloud
Make sure you provide a clear
computing provider go down, then the employees will not
conclusion at the end, that is a
be able to access the software and perform any of the
logical decision based on the
necessary office computing tasks.
points you have already made in
Overall, I believe that the law firm should switch to cloud your answer.
computing software. The fact that cloud computing
software doesn’t require a lot of processing power will save
the law firm money as they won’t need to upgrade their Your answer could be improved if
computers. The ability to collaborate between employees you referred to software costs,
will also help make the business more efficient. The issue of interoperability, security and training.
not being able to access the software without an internet
connection is unlikely to affect the firm much, as long as it
ensures a good internet connection. To revise cloud computing,
Links
see pages 21–22.
47