Ilovepdf Merged
Ilovepdf Merged
Personal computers
➔ Desktops - more space for components than laptops and provide users the option to
upgrade or add peripheral devices eg. printer, mouse, keyboard…
➔ Laptops - portable desktop devices, bigger, better quality screens and high
performance levels
➔ Single-board computer - affordable, storage of microSD card, used in education
due to embedded computing (hardware fixed to carry out specific task), and physical
computing (interactive system that senses and responds to surroundings)
Mobile phones
They use a SIM card to connect to a network.
➔ Specialist phones
◆ Has special functions to satisfy users needs or accessibility needs, ex.
emergency button or mobiles for blind and partially sighted people
➔ Smartphone
◆ Small computers with Wi-Fi and mobile connectivity to make phone calls and
access the internet
◆ Includes features of other devices such as camera, media player and games
console
◆ Applications (programs that allow a user to perform a task) can be
downloaded to customise their smartphones.
◆ Virtual keyboard is used to enter text, numbers, etc.
Tablets
Bigger than smartphones but have similar features; touch screen, apps and Wi-Fi
connectivity. Some have SIM card slots so they can stay connected while not on Wi-Fi.
- Sound systems
➔ Produce loud, rich sound using high quality speakers and amplifiers
➔ Can play music from CDs or local storage
➔ Connected to personal devices: (smartphones, media players, and tablets)
with USB or Bluetooth.
- Personal video recorders
Device that records broadcasted content to be watched at a later date
Eg. set top box - sends video and audio received from a broadcaster to a television
Game consoles
➔ Designed to enable users to play video games on a television screen
➔ Games are provided on disks or as downloads from the internet
➔ Use controllers, often wireless to control characters, vehicles, objects
Consoles use motion sensors to allow the player to control the game with gestures and body
movements. VR controllers to immerse the player in realistic gaming experience, they have
an avatar in the virtual world.
Media players
- Provide video and audio content to a television
- Could be direct from the internet or accessed from networked or local storage
- Connects directly to wireless / wired connection
- Use a remote control or smartphone app to control
Often use solid state flash memory - not affected by being moved or shaken.
Navigation aids
Calculate the best route between two or more locations and can provide updates to the
route if not followed accurately. Used in all vehicles.
Provide visual prompts and alerts
Specialist devices with audio alerts and waterproof/shockproof available for all
Use info from GPS satellites to determine the exact location of the device on Earth. Maps
are either stored permanently on device or downloaded from the internet when they are
needed
GPS doesn’t require the internet to work but navigation does
Portability
Easy to carry and move around, related to its size and weight
Performance
High-perf. Does job or tasks quickly, it is determined by the speed of the processor which
carry out software instructions.
Storage
Files and programs stored in storage.
More storage = more files and programs can be stored
Storage speed affects performance.
User interface:
Users give commands to devices through it.
✅
- Found on older devices, with limited storage
❌
Requires little memory
Commands must be precise because interface only recognises certain ones
➔ Menu-driven interface
= Displays a list of options as a menu, triggering a command of menu with further options to
✅
choose.
❌
Easier to use than CLI
More time consuming as you have to go through the whole menu structure.
- Used in devices ATMs, televisions and older mobile phones.
✅
Controlled by a pointer on the screen and uses screen made up of windows, icons, menus
❌
Easiest to use
takes up more memory + storage than the CLI and menu-driven
➔ Voice interface
Allows the user to give spoken commands to a device
Voice recognition software matches the spoken words with a library of words to find a match.
Requires internet access since library is online to not take up storage
❌
Disadvantages:
❌
Software isnt reliable - cannot find match or return unwanted results.
Requires internet access
-> voice interface checks instruction with user before searching
-> use results of confirmation to learn voice of user and improve future results
✅
Advantages:
✅
(Library is online to save storage)
Hands free option is possible
Eg. Often used in vehicles to improve road safety
➔ Gesture interface
Allow user to control the device by swiping or pinching their fingers across the screen
Found on devices with touch screen
_________________________________________________________________________
Connectivity
Devices can share data by connecting to each other using wire or wireless connectivity
Can be used to:
- Update software
- Back up files
- Play media
Different connectivity types provide different speed of data transfers + levels of convenience
Advantages Disadvantages
Energy consumption
D.D require electricity to work
Lower energy consumption = longer battery life
Due to rising cost of energy and pressure from customers + govt. to be more
environmentally responsible, creating devices that consume less.
-> Aim
● save money
● demonstrate social responsibility
○ Reduce environmental damage
Expansion capability
Some PCs allow user to install additional components with expansion slots - make use of
flash memory cards
Systems can be expanded using USB ports (connect peripheral devices)
Security features
Devices need to keep users’ data safe and prevent unauthorised access
➔ Software security
PIN to access device
Locks screen after not being used for a period of time, password required to unlock
If incorrect password entered, user must wait set time to try again
After several failed attempts, systems can wipe data
- -> prevents criminals from guessing combinations to break in
➔ Physical security
Prevent theft
Devices use:
- security slots with locks attached to secure them to furniture
- specialist slots
- ports with special screws
Input devices
Devices that send data to the computer
Allow user to control the computer or store data captured from sources outside the system
➔ Keyboards
- Use keys to input text or interact with software
Send data to the computer
Can be wired or wireless
Combinations of key presses -> access software commands called shortcuts
Touch-type - typing without looking at the keys -> increase speed of data input
➔ Pointing devices
Use on screen to select displayed objects
● Mouse
○ Use optical sensor to recognise momentment of device
○ Can be affected by the surface upon which it is placed some use roller balls
● Tracker ball
○ Rolled to move pointer, no buttons
● Trackpad
○ Surface senses finger movement + touch
● Joystick
○ Used on game controllers
○ Move sprites around game
● Graphics tablet
○ Flat pad + stylus
○ Pen used to draw/write on tablet
○ Used by digital artists + designers
➔ Barcode scanner
Reads pattern of lines and gaps detecting the widths
Represents letters and numbers to identity item
Used on parcels or items in shops
➔ Webcam
Specialised cameras with built-in microphones to capture sound
Generally lower quality than camcorders
Can be used as security cameras + stream media to the internet
➔ Microphone
Used to capture sound
- Diaphragm moves when air hits producing analogue electrical signal
- Mic acts as analogue to digital signal converter
-
Small low quality ones are built into computers and used for voice recognition allowing VoIP
calls using Skype/Google Meet
Higher quality used by recording artists
➔ Touch screen
Types:
● Resistive
○ Pressing causes two layers beneath screen to touch and make a connection
■ More durable than the other
■ Harder to read because layers reflect more light
■ Not suitable for multi-touch because only recognise one touch at a
time
● Capacitive
○ Pressing causes small charge flows away from finger because humans are
conductive
○ Chagre is measured precisely and locate exactly where screen touched
■ Used in smartphones
➔ Biometric scanner
Measure part of unique physical characteristics of user multiple times until average result
produced. Average is stored and future sample compared to it to check if it is the authorised
user -> allows info to be updated so saved sample is perfect
● Fingerprint recognition
○ Reads patterns on fingerprint because they are unique to each individual
person.
○ Can be obscured, damaged or changed because of injury/disease
➔ Card readers
Read data stored on a card carried by user
Can unlock doors, track things, make payments, access areas
Types:
● Magnetic strip
○ Least secure
○ Can be easily stolen and take money out
● Programmable chip
○ Only readable when PIN entered into reader
○ Helped reduce fraud
● RFID (Radio Frequency Identification) + NFC (Near Field Communication)
○ Short range wireless comm method
○ Cheap+small - in cards, key fobs, smartphones
○ Contain unique ID linked to records in a database
➔ Sensors
Input data about physical environment without need of human action -> output processed by
a computer
Main features of smartphones and homes.
✅
Benefits:
✅
can be placed in remote/dangerous locations
✅
monitor continually
✅
remove possibility of human error
✅
sense things people cannot eg. changes in gas/pressure
data easily converted into digital
➔ Monitor
Allow users to see output from computer on electronic display
Features:
- Screen size
- Resolution (pixels)
- Energy efficiency (low-power mode)
➔ Printer
Types:
● Dot matrix (impact printer)
○ Print made by hitting/impacting paper with ribbon of ink
○ Paper often has n. of carbon copy so it can make several copies at a time
● Inkjet
○ Use cartridges with different colours: cyan, magenta, yellow
○ Tiny dots spray on paper
● Laser
○ Rotating cylinder/drum holding electrical charge
○ Laser discharge certain points on drum to draw
○ Electrically charged toner attracted to points on drum and heated on the
paper
➔ 3D printer
Create real-life versions of digital models. Work by adding layers of heated material all the
way to the top. Take a long time to create.
Used to create complex items like working parts, eg. artificial limbs, prototype cars
➔ Data projector
Used for home entertainment eg. watching tv, playing games, presentations.
Features:
● Light bulb
○ Expensive to replace
○ Different brightness levels
● Resolution
○ Use different quality screens
● Zoom functionality
○ Enlarge image with optical or digital zoom
● Portability
○ Some lighter and smaller are available -> easy to move around
➔ Speaker
Allow a computer to output sound
Speakers need special amplifier provides different lvls of sound -> spatial awareness
Secondary storage
Not RAM or ROM
Non-volatile = will not lose data when system’s power is turned off
Used for:
- Storing document for future use
- Storing application ready to load into RAM
- Virtual memory
Amount of time it takes for the head to access data on tracks determines how fast the
cylinder spins and how fast the head moves across the tracks.
When reading, the head changes the magnetic field into electrical current.
When writing, transforms electrical current -> magnetic field
Optical media
● CDs
○ Store up to 700MB
○ Written to disk using laser
■ Writes data to a plastic layer beneath layers of aluminium and acrylic
● DVDs
○ Look like CDs
○ Data written to DVDs use shorter wavelength of red laser light -> allows to
store more data
○ Store 4.7GB single-sided, single-layer disk
○ Double-sided disk store 18GB
● Blu-ray
○ Use scratch-protection coating
○ Violet laser rays used to store data at grater density than the red laser
○ Can store 25GB on single
Flash media
More energy efficient than hard disks because dont have moving parts
Less likely to fail when moved around
More portable
Magnetic tape
Originally designed to record sound, can store data
Chapter 2: Software
System Software
Designed to maintain or operate the computer system.
Utility system
Carries out configuration and maintenance tasks
Backup
Creates a copy of files and programs, can be automatic
Defragmentation
Spreads fragments of data across disk where there is free space
Compression
Reduce the og size of a file to reduce storage space
Formatting
Prepares storage media for its first use for user
Operating system
Allows user to control and manage computer hardware
➔ Single user : for general user, can’t be customised eg. household appliances
➔ Network:
◆ Send request to server when log in
◆ Separate user accounts
◆ Provide access to network storage and resources eg printers
Memory management
Allocating the required amount of memory to one or more applications, when not in use,
makes it available to other apps.
Handles creation of virtual memory
Resource management
Ensures system resources are made available to apps when requires, if in use then the
request adds to queue
Security
Requires authentication, provides a firewall to authorise access.
Print spooling
Process of keeping pages queued in order, ready to be printed
Application software
Apps allow users to produce a digital product.
1
ICT iGCSE Revision
Office productivity software
On application suite = collection of apps that share same look, user interface, data and
functionality
Word processing
Lets users create docs including text, pics, hyperlinks, tables, graphs and equations
Good for making letters, reports and essays
Let docs be collaborative and track history.
Desktop publishing
Sames as word but users use complicated page layouts
Spreadsheets
Used to calculate with formulas
Database
Features:
● Data entry forms
● Query editors
● Report builders
Presentation software
Create engaging multimedia content on slides to support a talk or topic
Timing can be set manually
Web authoring
Lets users create web pages that include text and graphics.
HTML translate browsers into pages - browser eg Google Chrome
People can see it on the intranet or web server.
Image editing
Lets users create and change bitmap images.
Graphics editors - allow user to create and edit vector pics
Features:
● Vectorising images
● Layers
● Adding text
Photo editors - allow user to edit/enhance digital images
Features:
● Adjust brightness + contrast
● Resizing image
● Cropping
Sound editing
To edit audio files or join tog different audio files for multitrack
Features:
● Cut/join audios
2
ICT iGCSE Revision
● Mute and solo tracks
● Change tempo
● Add reverberation
● Apply audio processing
○ Normalisation = increasing the average volume of audio to a defined max
○ Noise reduction
○ Reverse
○ fades
Control applications
To make something happen in physical environment, with devices like motors.
Receives info from sensor and makes a decision based on input value
Used in engineering, vehicles and home automation systems.
-> devices monitored using smartphone app
Created by programmers rather than general users, not eas easy to modify.
Project management
Apps track tasks, show dependencies, set timelines, milestones, and allocate resources
efficiently to individuals or groups to more than one task.
Communication software
= Enables remote access and allows file and message sharing via the internet.
● Web Browsers
○ Access web pages, FTP (filee transfer protocol) servers, and internet
systems.
● Email
○ send and receive messages
○ Client-server model
○ manage contacts
○ use webmail or offline storage.
○ organise with filters
● Social Media
○ accessed via browsers or apps
○ enabling multi-account management
● SMS
○ sends text via mobile networks without internet.
● MMS
○ extends SMS to include multimedia like images and videos
○ without internet
● Instant Messaging:
○ requires internet
○ supports real-time typing indicators
○ share location data.
3
ICT iGCSE Revision
Software licensing
Free/Open-Source:
● Users can study, modify, and redistribute software - free
● Open source liceneses make the source code available to users - open-source
Proprietary:
● Software marketed and distributed by the owner under brand name.
● Can decide fee for software, if free = freeware
● Using unlicensed software is considered piracy.
Software updates
Updates released by developers to:
● Fix vulnerabilities/bugs
● Increase compatibility
● Improve usability
● Introduce new features
4. Explain why utility software allows the user to schedule backup processes
So backup processes can be completed when the system isn’t being used to avoid file
conflicts.
4
ICT iGCSE Revision
6. Describe how presentation software can help a presenter to give a talk
By allowing the user to create slides that contain content that support their talk.
8. Discuss why a building company might use project management software
Companies must adapt to scheduled timelines because multiple resources such as materials
and staff such as engineers need to be coordinated in phases which are dependent upon
each other.
The software ensures that the project hits its targets and forecasts for completion can be
provided, with progression monitored so that stakeholders can be updated with progress.
5
ICT iGCSE Revision
Volatile memory = means data is retained in RAM as long as the computer is on, but it is lost
when the computer is turned off
Non-volatile memory = means after power on the devices is turned off, the data is not lost.
1
ICT iGCSE Revision
Contains instructions needed for the computer to boot up and run its programs.
Used in single-purpose devices and general-purpose computers for booting systems.
Types of ROM:
○ ROM: Data cannot be changed after manufacturing.
● EEPROM evolved into flash memory, used for updating firmware on devices.
Storage:
8 bits = 1 byte
1 kilobyte = 1024 bytes
1 megabyte = 1024 kilobytes
1 gigabyte = 1024 megabytes
Processors
Carry out software instructions
Made up of 1+ CPUs - referred to as a core
Processor cycle = fetching program instruction from memory, decoding actions required by
instruction and executing.
Processor speed measured in clock cycles per second -> clock cycles measured in hertz
Construction of a expression
2
ICT iGCSE Revision
An area of secondary storage used to store data when the computer system doesn’t have
enough space in RAM
5. List three characteristics of RAM that make it different from ROM
● Volatile
● Temporary storage
● Upgradable
6. Give 2 reasons why characteristics of flash memory make it suitable for use as
secondary storage in smartphones
Doesn’t have moving parts so lower power consumption, doesn’t loose data easily if device
is knocked.
7. Describe clock cycle
Number of times per sec that a processor can carry out instructions.
3
ICT iGCSE Revision
Unit 2: Connectivity
Bandwidth
Speed at which devices can transfer depends on bandwidth
Latency
Amount of time it takes to send data between devices. Can be detected with domain.
Domain
= Name used to identify a web server
Ping a domain ➞ send packet of data ➞ packet returned by server to og device.
1
ICT iGCSE Revision
Device-to-Device communication
Can connect directly to each other using wired/wireless methods.
Network Communication
LAN (Local Area Network)
Connects digital devices that are in a small geographical area.
Tethering
Process of connecting a host device that uses a mobile broadband connection with one of
more devices. Part of the service agreement.
2
ICT iGCSE Revision
GPS
Satellite communications are used for GPS.
Television
A satellite television viewer will have an antenna installed, and this receives the signal and
sends it to a set- top box. The set-top box decodes the signal and converts it so that it is
ready to be sent to a television.
Telephone
Satellite communication is also used to allow people in remote areas to place voice calls
using satellite telephones.
Broadcast communication
Analogue television and radio
Transmitters broadcast television and radio signals that are received by a viewer's antenna.
This antenna sends a signal through a wire to the television or radio receiver, which converts
it into images and audio.
Wired communication
Ethernet
= a network connectivity standard that provides a way for computer to communicate
3
ICT iGCSE Revision
Wi-Fi
= A wireless technology used to connect devices to a network. That network can be
connected to the internet, so that devices connected to the Wi-Fi network can connect to the
✅
internet.
✅
long range
✅
high bandwidth
✅
high security
can connect to multiple devices simultaneously
❌ high power
9Pair
= connect two devices (usually only with each other)
Bluetooth
❌
= a type of wireless connectivity that lets devices connect over short distances.
❌
cannot carry as much data as Wi-Fi
❌
short range
❌
low bandwidth
❌
low security
devices need to be paired with each other before they can communicate
✅ low power
3G + 4G
4
ICT iGCSE Revision
Infra-red
=a type of electromagnetic radiation with a larger frequency than that of visible light
- can only carry much data and only have a short range.
- It is often used in remote-control devices such as television remote controls.
5
ICT iGCSE Revision
Copper cable
= a cable that sends data using electrical signals, which are conducted through copper
wires.
b) State one way in which using infra-red in games console controllers affect the
experience of the person playing the game.
Using infra-red in games console controllers can affect the experience by requiring a direct
line of sight between the controller and the console. If something blocks the signal, the
controller may stop working, which can interrupt gameplay and make the experience
frustrating for the player.
3. Explain why streaming is more convenient for the user than downloading
Streaming is more convenient than downloading because the user can watch or listen
instantly without waiting for the whole file to download. It also saves storage space on the
device since the file isn’t permanently saved.
A LAN
B WAN
C PAN
D VLAN
6. Explain why global games companies use games servers in multiple countries to
ensure that the experience of users is not negatively affected when playing onñine
games.
6
ICT iGCSE Revision
Global games companies use game servers in multiple countries to reduce lag and
improve connection speed for players. When a server is closer to the player, data doesn't
have to travel as far, so the game responds faster. This helps ensure a smoother, more
enjoyable experience with less delay, especially in fast-paced online games.
7
ICT GCSE Revision
Unit 2: Connectivity
Chapter 5: Networks
● Passing usernames and passwords to a server for checking when a user logs
in
● Separating user accounts and ensuring that users cannot access each other's
files
● Providing access to network storage and shared resources such as
networked printers.
IP address
unique address that networked devices use to send data to each other. Each piece of data
that is sent across a network carries the IP address of the destination, so that each device in
the network knows where to send it.
• IPv4 uses four groups of up to three numbers separated by full stops (for example,
192.168.1.1).
• IPv6 uses eight groups of four hexadecimal numbers separated by colons (for example,
2001:0db8:0000:0042:0000:8a2e:0370:7334).
1
ICT GCSE Revision
Mac address
Unlike IP addresses, which can be dynamically allocated by users or servers, media access
control (MAC) addresses are universally unique identifiers given to the network interface
card (NIC).
MAC addresses are used in devices connected to local area networks (LANs) using
Ethernet, Bluetooth or Wi-Fi.
MAC addresses are assigned by the NIC manufacturer and are generally considered to be
fixed addresses.
MAC addresses are usually made up of six pairs of characters. The first three pairs identify
the manufacturer and the remaining pairs are assigned by the manufacturer to uniquely
identify the device. Figure 5.6 is an example of a MAC address.
Universally unique
the only one of its kind in the world
Identifier
a group of letters, numbers, or symbols that a computer has been programmed to recognise
and use to process information.
2
ICT GCSE Revision
Cat6 cables can be used to transfer data at 10 Gbit/s. These are more expensive than Cate
cables and are usually only used by businesses.
Mbit/s
the amount of data that can be transferred per second, measured in Megabits1( Mb=1
million bits)
Gbit/s
the amount of data that can be transferred per second, measured in Gigabits 1( Gb =
1,000,000,000 bits)
Switch
A switch connects devices on a network. It has ports, each of which can be connected to a
device using a cable. Connecting a wireless access point to a switch via a cable gives
wireless devices access to the wired network.
Port
A socket into which cables and devices can be plugged.
Gateway
A gateway connects two different types of network. For example, a LAN is connected to a
WAN using a gateway.
Router
A gateway connects two different types of network. For example, a LAN is connected to a
WAN using a gateway.
A router stores the addresses of all devices that are connected to it so that it can forward
network traffic to its destination using the quickest route. Most routers used in homes include
3
ICT GCSE Revision
a switch and a wireless access point. They also act as gateways, connecting the LAN to the
internet, which is a type of WAN.
Booster
A booster is used to amplify the signal in a network so that its range can be extended. For
homes and offices, wired Ethernet connections often have a maximum range of 10 m.
Wireless signals have limited range, too. Boosters can be used for both wired and wireless
connections.
Server
A server is a computer that shares its resources with connected devices. Computers
connected to a server are known as clients. Resources that can be shared by one or more
servers include printers, storage and applications.
➔ Authentication server
An authentication server checks usernames and passwords. When a user successfully logs
in, the client receives an electronic certificate that it can then use to access various
resources, including applications and storage.
➔ Print server
A print server manages multiple printers at a time, dealing with print requests from client
computers and adding jobs to a queue so that individual printers are not overloaded with
requests. Print servers can also monitor and process print requests, making sure that users
or departments can be invoiced for the jobs that they send to the printers.
➔ File server
File servers allow users to access shared and private storage.
➔ Application server
Application servers provide clients with access to applications that can be run directly from
the server.
➔ Web server
Web servers process requests for data made via Hypertext Transfer Protocol (HTTP).
Together, all of the content stored on all web servers is known as the World Wide Web.
Client computers often access web servers from outside the LAN to which the server is
connected.
4
ICT GCSE Revision
Telecommunications infrastructure
the networks of hardware facilities, owned by private and public organisations, that are used
to transfer data.
Web browser
A web browser is a type of software application used to request and display information
stored on web servers. Examples of web browsers are Mozilla Firefox, Google Chrome,
Internet Explorer® or Microsoft Edge, Opera®, and Safari®®.
Search engine
A search engine provides users with a way to find information in web pages stored on web
servers. Users enter keywords that describe the information they want to find. The search
engine then compares the keywords with those in its database of web pages and returns the
results that are the closest match to the given keywords.
Filter software
Filter software prevents users from accessing inappropriate information. When a user tries to
access a web page, the address (URL) and/or the contents of the web page are compared
against two lists of URLs and keywords stored in the filter software's database. The two lists
are the blacklist and the whitelist.
Blacklist
a list of unacceptable URLs
Whitelist
a list of acceptable URLs
5
ICT GCSE Revision
Local area networks (LAN)
Firewalls
A firewall is used at the gateway to a network. It controls the network traffic to and from a
network, particularly the traffic from the internet. Firewalls prevent unauthorised users from
accessing network devices and resources, such as storage. Firewalls are available as
hardware and software, which can be installed on computers to prevent attacks from within a
network.
Encryption
Encryption is the process of encoding, scrambling or jumbling data so that unauthorised
users are prevented from being able to understand it.
6
ICT GCSE Revision
A computer shares a public key with other computers that want to send it encrypted data.
This public key is mathematically related to a private key, which is not shared.
Transaction logs
All network activity recorded in log file, does not directly secure network data.
Allows administrators to identify any unusual activity that could be threat to data security
Backups
Copy of one or more files. Usually stored on dif storage device to the original file
7
ICT GCSE Revision
End of Chapter Questions:
1. Which one of these connects a LAN to a WAN?
A. Switch
Answer: B. Gateway
C. Modem
D. Server
2. Explain why public key encryption is more secure than symmetric key
encryption.
Answer: Public key encryption uses two keys: a public key to encrypt data and a
private key to decrypt it. Only the private key holder can decrypt the data, reducing
the risk of interception compared to symmetric key encryption, which uses the same
key for both encryption and decryption.
3. State which security device controls the traffic entering a network.
Answer: Firewall
4. State two methods by which devices are identified to each other on a network.
Answer:
○ IP addresses
○ MAC addresses
5. Explain why IPv6 was used to replace IPv4.
Answer: IPv6 was introduced to provide a much larger address space because
IPv4’s 32-bit address system could not accommodate the growing number of
internet-connected devices. IPv6 also offers improved efficiency and security
features.
6. State two uses for a VPN.
Answer:
○ Securing data transmission over public networks
○ Accessing restricted content or bypassing geographic restrictions
8
ICT GCSE Revision
9. List three methods of securing data on networks.
Answer:
○ Using firewalls
○ Encrypting data
○ Implementing strong passwords and authentication protocols
11.Draw and label a network diagram for a home that includes two smartphones,
one tablet device, two desktop PCs, and internet access.
Answer: A home network diagram should show:
● A central router connected to the internet
● Two smartphones connected wirelessly to the router
● One tablet connected wirelessly to the router
● Two desktop PCs connected to the router (either wired or wirelessly)
9
ICT iGCSE Revision
Unauthorised access
= access to networks by users who are not permitted to access them.
Malware
= (malicious software) software that is created with the intention to do them
Very threatening and distressing for users putting pressure before they have time to think
about the threat and manage it
Accidental deletion
This happens if:
- They press a key on keyboard by accident
- Format media on wrong storage device
- Device loses power unexpectedly
➔Phishing
A technique used by criminals to get personal information and payment details from
users.
➔ Either large n. of messages on SMS or emails from ‘real’ organisations.
➔ Emails have a hyperlink which asks for users' info.
Spear phishing -> can be highly customised/personalised to target particular users
➔Pharming
= to gain personal info and payment details from users on fake versions of trusted
websites
Main methods to direct users:
● Internet traffic
○ Going to real website redirects to fake websites by altering domain name
servers
○ Use malware to redirect web requests
Firewalls
= Control data travelling in and out of a network
Examine network addresses and ports of data and compare to list of rules set by network
administrators to prevent unauthorised access or malware from network
Encryption
Uses a key to scramble data into an unreadable form, if intercepted they must identify the
key
When enter pin they are often masked so anyone looking cant see what's typed with ****
Some allow passwords to be remembered but not recommended.
Network operating systems are more secure and will not allow different users to see each
other’s stored passwords
Work by asking users to enter a randomly generated series of letters and numbers are
displayed on the screen
reCAPTCHA use extracts of text from scanned books or images that share common
features
-> make more books available online + improve info in online maps
Anti-malware
Prevents malware from accessing/operating on computers by scanning files
➔Anti-virus
Virus = malware that uses networks to spread to connected devices via
communication software or being loaded into memory from external storage
Often combined with software that protects against adware and spyware
➔Anti-adware
Adware displays unwanted adverts to users, anti-adware removes it
➔Anti-spyware
Spware secretly monitors and records computer data and user input
This detects, quarantines and removes it
Secure websites
HTTP used to exchange data between web server and client but not securely
Backup procedures
Create copies of data and store on:
● External storage device
○ makes data secure
■ stay safe if original is damaged/stolen/lost
● Online storage
Users decide how many files to back up and how often they should back them up
Regular back ups require more storage space
Bank cards
Customers pay for goods/services online and in shops
Online you enter the:
- Card number
- Expiry date
- Name on card
- Security code (CVV)
Sometimes asked to authenticate payment by entering password in system eg. Mastercard
1. Which one of these is used to control internet traffic entering a network?
C. Firewall
2. Explain why CAPTCHA tests work.
CAPTCHA tests work by distinguishing between humans and automated bots. They
require tasks that are easy for humans to perform, such as identifying images or
typing distorted text, but difficult for bots to complete.
3. State the purpose of pharming and phishing.
The purpose of pharming and phishing is to steal sensitive information, such as
usernames, passwords, and financial details, by tricking users into visiting fake
websites or providing their personal data.
4. List three pieces of data from a bank card that a user is asked to enter when
making an online payment.
● Card number
● Expiry date
● CVV (Card Verification Value)
5. Describe one way in which incremental backup differs from differential backup.
Incremental backup only backs up data that has changed since the last backup, while
differential backup includes all data that has changed since the last full backup.
6. Describe how encryption secures data on a network.
Encryption secures data by converting it into an unreadable format using a
cryptographic algorithm. This ensures that only authorized users with the correct
decryption key can access the original data, protecting it from interception or
unauthorized access.
7. State two methods used by an online system to authenticate a user.
● Passwords
● Two-factor authentication (e.g., sending a code to a user's phone or email)
8. State two methods used by criminals to get users to visit fake sites.
● Sending phishing emails with fake links
● Using search engine manipulation to make fake sites appear in search results
9. Explain one disadvantage of using online storage for backups rather than local
storage.
Can be slower to backup because the connection to the internet provides less
bandwidth than a local data connection.
Employment
Has had an impact often requiring people to learn new skills so they can change the way
they work.
Skill requirements
Use the internet for work, meaning that employees need to learn new skills.
Eg. journalists submitted work through word processor -> now required to post and update
stories on social media.
Must be able to react quickly to stories which means typing and proofreading skills must be
of good standard to post quickly with no mistakes.
Modern teachers must be familiar with info and services available on the internet to teach
students about them, and help manage the risks they could face online.
As the nature of jobs changes and the use of the internet at work grows, skilled
workers are needed to support this development. People are required to train and advise
unskilled workers and to create the digital devices and software that workers use. Other
people are needed to install and maintain the systems used.
Job losses
If employees do not keep updating skills in use of the internet they may not have the skills
required to carry out new work. If they are not willing or able to retrain, they lose their job.
Working practices
Ways in which people carry out their tasks in their job.
Collaborative working
The Internet enables people to connect with each other in real-time. Makes it more efficient,
allows work to be done more quickly. Collaborative working allows work to be split into a
number of individual tasks, each of which can be done by a different person.
✅
Advantages
✅
Each employee can focus on one task
Employees become experts in their narrow area of expertise
❌
Disadvantages
❌
Employees don’t share their skills and expertise
Reduced understanding of the whole project
✅
Advantages
✅
Expertise is shared
Employees can check each other’s work
❌
Disadvantages
❌
Can be difficult for lots to agree
Can be difficult to coordinate the work of many employees
Flexible working
Way that suits an employee’s needs. Eg. allows employees to decide the hours that they
work or enables them to work from home. It is possible because employees can use the
internet to access systems from anywhere with an internet connection at any time.
✅
Advantages
✅
Work when right for them + take breaks when needed
Fit their work around their family life
❌
Disadvantages
❌
Don’t meet face-to-face, reduces understanding of each other and employer
May not manage work effectively, could affect home life or cause exhaustion
✅
Advantages
✅
Access up-to-date info
Work from anywhere with internet
❌
Disadvantages
❌
Become exhausted if they work longer hours than usual when travelling
Not have access to same facilities or resources as those in one place
Social impact
Huge impact on the way in which people socialise, thanks to sites like Facebook and Twitter.
Social interaction
Humans are naturally social and require social interaction with others, we feel a need to
connect. The internet allows humans to communicate with any other connected person,
through gaming, video calls, messages and networking sites.
There are concerns about the increasing use of virtual environments replacing face-to-face
interactions. It is damaging people’s ability to talk to each other.
Gives users access to a wider community which makes people more aware of other cultures
and societies: broadens our view on the world. We connect via social network applications.
Physical activity
Access to online goods and services means that people do not have to leave the comfort of
their homes to do things. Reduced the need to travel and do physical activities - could have
negative effects on health and wellbeing.
Zip it
Keep personal info private and don’t share it with strangers. Eg. location, school, phone
number, photos, email, name…
You can use privacy settings on social networks to stop strangers from viewing your profile.
Block it
Always block offensive messages or friend requests from strangers on social networking
sites. Do not open suspicious attachments or links, put on search filters to see
age-inappropriate content
Flag it
If something upsets you or id someone you don't know is requesting you. Users can report
grooming to national crime agencies.
Virtual Global Taskforce - international organisation that protects young people online.
Digital Footprint
All the data that a user creates online, which is recorded and stored.
Content can be easily viewed by people you didn't expect. Can be copied and shared easily,
it could become available to anyone.
- Would I show this to my parents or grandparents?
- Could people misinterpret this?
Minimise footprint by:
- Closing old social media accounts and requesting that all archive data is deleted
- Search for your own name online and see what info about you is available.
Many modern digital devices can run a range of software and can be used to access the
internet, online systems and applications. People can use digital devices provided by their
employer, or even their own devices to connect to the internet and work from home.
✅
Benefits or working from home
To individuals:
➔ No need to travel to work
◆ Reduces stress caused by traffic, public transport delays and overcrowded
transport
◆ Saves money
◆ Helps the environment by reducing travel emissions
➔ Spend more time working or resting -> spend less time travelling
➔ No need to wear uniform or business clothes -> reduces cost
➔ Work flexibly
➔ Can work on tasks for longer periods of time without distractions from colleagues or
meetings
➔ Work in comfy environment
❌
➔ Organise work around social & family commitments
Drawbacks to individuals:
➔ May be distractions at home
➔ Suffer from lack of interaction with colleagues
➔ Feel disconnected from company
✅Benefits to organisations:
➔ Attracts talented, motivated workers
➔ Can employ people located anywhere in the world
➔ Do not need to buy or rent office space or furniture for employees
➔ Workers dont community, they will not delay work
❌
➔ Worker may work more effectively at home
Drawbacks to organisations:
➔ Concerns about data security
➔ Difficult to manage and support employees
➔ Employees might not work as hard
➔ Can be complicated on paycheck day for workers in dif. Countries
Positive impacts:
● Improved communication
Can communicate and interact with customers and employees more easily and in real-time
using email, messages, and social media. Provide up to date info about developments,
pricing and availability of their products and services. Eg. charities
Cecilia Jones Maganto
5
ICT iGCSE Revision
● Access to global markets
Easier to advertise and sell to customers in countries around the world. Producers of digital
content are now able to sell their products online without having to create physical packaging
and avoid postage charges. Ensure that manufacturers have easier access to businesses
that produce materials -> better communication
Eg. Computer game retailers use data gathered from analysed media posts, web browser
patterns, ratings and sales to predict which game will sell best in future. Can then make sure
to buy stock of the game to meet demand, and not too much for less popular ones.
Eg. weather data from sensors, phones and aircraft- Processing allows org. To understand
how diff types of weather can affect their services.
Negative impacts
● Security issues
Data stored is private and valuable. Data physically stored by walls locks alarms and
security guards.
Employees often work from home, organisations use internet to provide their employees
access to their systems
- Employees transfer copies of org. Data to home via email
- Providing remote access to data stored in org’s building such as by VPN
- Storing data on another company’s servers and providing access to data
Each method means data is more vulnerable to being accessed by unauthorised users.
The internet has provided new channels for the trade and distribution of goods and services.
Threatened by:
● Music, film and DVD retailers - online downloads and streaming
● Record labels - independent artists publish and distribute music online
● Estate agents - people advertise independently
● Postal services - ability to send message and media instantly
4. Explain one reason why the use of the internet may affect the ability of
individuals to interact with other people face-to-face.
People often spend significant time online, engaging in virtual communication through social
media, messaging, or gaming. Leads to fewer opportunities or less motivation to connect in
person, potentially diminishing social skills and personal connections.
5. Explain one reason why cyberbullying can be more distressing than in-person
bullying.
Cyberbullying can be more distressing because it can happen anytime and anywhere,
making it difficult for victims to escape, even in the safety of their own homes.
8. State three examples of services that are not available to those with limited or
no access to digital technologies.
VLEs, digital banking, government services.
9. Describe two ways in which greater access to networks has affected society.
Improved communication allows people to connect instantly, access to networks has created
new jobs
13.Explain why organisations use the internet increases the risk to data security.
Increased exposure to cyberattacks, hacking, phishing to compromise private data and its
wider access points increase the chance of a data leak.
Features :
- Profiles
Add information about yourself, some services allow users to decide info that can be shared.
Includes biographical details, a bio, images, contact info…
1
ICT iGCSE Revision
- Tags
Allows members to categorise content they create and post on network communities
- User suggestions
Suggest other members that users might want to connect with, by analysing interests and
mutuals
- Share
Allows members of the community to repeat other member’s posts to the community, making
it more available to others. Going viral = something circulated widely by being shared
through networks to large numbers of users.
- Third-party integration
Include direct links to sites so that people can share the info provided on third-party
websites.
Additional Features
- Private or DMs
Allow members message each other instead of doing it publicly
- Notifications
Alert that tells a user about a new interaction or new content within a community.
- Analytics
Helps individuals and organisations identify their most effective communications to increase
size of network and gain followers
2
ICT iGCSE Revision
- Links to social media
- User profiles
- Experience points
- Statuses and notifications
Features of wikis
- Member accounts to track edits
- Structure language
- Search tools
Forums
Function: website where users can post comments and info replying to other comments.
Provide online spaces for structured discussions = threads
Features:
- Groups + moderators + administrators
- Posts + threads
Safety measures:
● Word or URL censoring
● Report and block buttons
● Policies
3
ICT iGCSE Revision
User Generated Content
Content available online made by users of particular site/service
4
ICT iGCSE Revision
How to stay safe online
Protects users but they can misrepresent themselves by pretending to be someone they
aren’t
Cyberbullying
Use of internet to send texts or images in order to upset or embarrass someone
✅
C Features that allow commenting and sharing
D Acceptable use policies
3. Describe how social networking services benefit from members sharing
content.(4)
Sharing increases reach of content and encourages users to be more active users of
service. Provide the service with more info which the services then use to sell marketing
opportunities to advertisers.
4. Explain why some online communities have administrators and moderators. (3)
Different levels of user responsibility can be set so people are responsible for quality
checking members and posts to ensure policies are followed, block posts and ban members
from community.
5
ICT iGCSE Revision
5. State three ways in which a user can personalise their online profile. (3)
Name, gender, date of birth, ‘about’ section.
8. Describe how social networking sites are able to make suggestions to
members about people that they may want to connect with. (2)
Matching info shared by members
9. Describe how some social networking sites are able to decide which
advertisements to show to different members. (2)
Matching info shared by members
10.State four ways in which students can use the features of VLEs to support their
learning. (4)
- Students access resources
- Students interact with teachers
- Students can collaborate on assignments with others
- Students get immediate feedback from quizzes
11.State three examples of interactions that social network users can have with a
member's post. (3)
- Like
- Repost
- Comment
12.Discuss the factors that users of social networking sites should consider when
sharing personal information. (8)
When using social networking sites, users must consider several important factors before
sharing personal information online. One key consideration is personal safety. Sharing
details like your location, phone number, school, or daily routine can put you at risk of being
contacted by strangers or even becoming a target for criminal activity such as stalking or
identity theft. Therefore, it’s important to only share information with trusted people and to
use privacy settings to control who can see your content.
Another important factor is the cost to users’ privacy. When people post personal information
online, they often lose control over how that information is used. Even if the post is later
deleted, others may have already saved or shared it. This can affect users in the future, for
example, when applying for jobs or college placements, as employers may look at online
profiles during the recruitment process.
In addition, companies may share users’ personal information with third parties. Social
media platforms often collect data from users, including their interests, search history, and
6
ICT iGCSE Revision
location. This data can be sold to advertisers or used for other purposes, often without the
user fully realising it. While this is sometimes allowed by the platform’s terms and conditions,
it still raises concerns about how much control users really have over their data.
Finally, users should be aware of targeted marketing. This is where companies use the
information gathered from social media to advertise products and services specifically to
individuals. While this might seem useful, it can also feel invasive and manipulative, as it can
lead users to spend more money or be influenced in their decision-making without fully
realising it.
In conclusion, while social networking sites can be fun and useful, users must be cautious
about what they share. Considering personal safety, privacy, and how companies use their
data can help protect them from potential risks online.
7
ICT iGCSE Revision
Shopping sites
When user shops online they use a product catalogue grouped into subcategories
Features:
- Image of product
- Description + Price
- Ratings / Popularity
- Product code
- N. of stock
When customer likes product, they add it to an online basket: keeps record of items so they
don’t have to pay separately
1. When ready to pay, directed to checkout where they insert delivery details and pay
with voucher codes
2. If customer doesn’t have account, they could shop as a guest or be asked to create
one. If guest you can’t follow progress of order or receive offers
3. Shopping sites offer secure payment systems to protect customers’ payment info
when transmitted online
_________________________________________________________________________
Booking systems
Train + airline + bus tickets + leisure tickets can be purchased online. Customers choose
travel time, n. of tickets and type of tickets they want.
Can also be added to a basket.
_________________________________________________________________________
Banks
Online services they offer:
● Checking balances
● Balance alerts
● Making payments + transfers
● Applying for loans + financial products
1
ICT iGCSE Revision
● Managing alerts and notifs of payments and balance amounts
● Accessing customer service
● Changing personal info
_________________________________________________________________________
_________________________________________________________________________
Gaming sites
Online applications that allows users to play games that are hosted on a remote server.
Can be multiplayer and control dif characters in real time.
_________________________________________________________________________
_________________________________________________________________________
Auction sites
Allows sellers to list items for sale for a certain period of time and allows buyers to offer
money for these items
Buyer offered most money completes the checkout process.
Provide ratings for buyers, if high = reliable and pay on time but seller chooses which buyer
If buyer bids but someone else offers more money, they will alert buyers so they don’t miss
chance
_________________________________________________________________________
2
ICT iGCSE Revision
The impact on lifestyle and behaviour
Benefit Drawbacks
More time can be spent with family/friends More time spent using online services
Ppl more engaged with creative media Ppl may be less active because they
(art,videos,drama,photography) access services without having to move
Transactional data
= data that is sent between digital devices
Online transaction occurs whenever data is sent between devices on the internet
Data stored as ‘cookies’ that can be encrypted can be tracked online by network
Cookies = info that a website leaves on a user’s computer so the website recognises them
Data stored as cookies:
- Time + date of transaction
- IP addresses
- Referring website
- Products + services viewed/bought
- Data entered in forms
➔Session cookies
Only stored until a web page is closed in browser
➔Persistent cookies
Used to record info about the user’s use of the internet overtime, can keep a user logged
into online account so they don’t have to log in every visit
3
ICT iGCSE Revision
Allow advertises to track users’ use of the internet
➔Third-party cookies
Can be used to personalise users’ online experience and target adverts
Targeted marketing = advertising that is matched to people based on browser history and
attributes because of ad servers
Ad server can request the cookies each time the banner loads and gets tracked, then server
can select advertisements to display banner.
✅ Paying in cheques
1. Which one of these is not provided by banks as an online service
Transferring money
Viewing account balance
Applying for a loan
2. State two ways in which education providers can use online services to help
learners
-VLEs
-Online support
5. Explain why banks use HTTPS for their online services
Uses encryption to stop their customers data from being read by unauthorised users
4
ICT iGCSE Revision
9. State the difference between session cookies and persistent cookies
Session cookies are only stored while the browser has the site open or until the browser
closes the site. Persistent cookies are stored after the browser closes the site
10.State the way in which news services can use a feature of smartphone apps to
keep users up to date
Use of notifications or alerts
5
ICT iGCSE Revision
Local hardware
When you use software stored on your hard drive for files
-> provides best performance because no network connectivity slowing transfer of data
When you use the cloud you use the internet to access apps stored on severs.
Advantages Disadvantages
Accessible from many types of connected Only accessible with Internet connection
device
Uses online data storage - save files online User experience affected by high latency or
low bandwidth
Advantages Disadvantages
More local storage available Some files can’t be opened w/o download
Netbooks
● Inexpensive
● Don’t need alot of storage because they access hosted applications and online data
storage
● More people have access to technology = helped reduce the digital divide
Cloud-based services
Help organisations providing scalable solutions to needs. Save on the cost of buying,
housing and maintaining their own servers.
Provide individuals variety of online services like:
- Shopping sites
- Booking systems
- Banking
Can provide access to online communities like social networking sites, online work spaces
and user-generated content.
✅
Smartwatch
Server
Tablet
2. State three benefits of using online data storage.
- Accessible from many types of connected device
- Uses online data storage - save files online
- Features that enable collaboration
3. State three online services provided by cloud-based services
- Shopping sites
- Booking systems
- Banking
4. State what is meant by the term ‘cloud’.
The term cloud is used to describe the internet when it is used to provide software or space
for storing information.