0% found this document useful (0 votes)
31 views66 pages

Ilovepdf Merged

The document provides an overview of various types of digital devices, including mainframe computers, personal computers, mobile phones, tablets, cameras, home entertainment systems, game consoles, media players, navigation aids, and smart home devices. It discusses their features, functionalities, and the importance of user interfaces, connectivity, energy consumption, and security. Additionally, it covers peripheral devices and their types, including input devices like keyboards and scanners, as well as output devices like monitors and printers.

Uploaded by

Nico Rex
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views66 pages

Ilovepdf Merged

The document provides an overview of various types of digital devices, including mainframe computers, personal computers, mobile phones, tablets, cameras, home entertainment systems, game consoles, media players, navigation aids, and smart home devices. It discusses their features, functionalities, and the importance of user interfaces, connectivity, energy consumption, and security. Additionally, it covers peripheral devices and their types, including input devices like keyboards and scanners, as well as output devices like monitors and printers.

Uploaded by

Nico Rex
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

ICT iGCSE Revision

Unit 1: Digital Devices

Chapter 1: Digital Devices


Types of digital devices
Mainframe computers
large, powerful computers used for complex processing tasks and microprocessors are
embedded in products such as washing machines.
Microprocessor
the device that controls what a computer does; it takes data as input, does something with it
and provides output

Personal computers
➔​ Desktops - more space for components than laptops and provide users the option to
upgrade or add peripheral devices eg. printer, mouse, keyboard…
➔​ Laptops - portable desktop devices, bigger, better quality screens and high
performance levels
➔​ Single-board computer - affordable, storage of microSD card, used in education
due to embedded computing (hardware fixed to carry out specific task), and physical
computing (interactive system that senses and responds to surroundings)

Mobile phones
They use a SIM card to connect to a network.
➔​ Specialist phones
◆​ Has special functions to satisfy users needs or accessibility needs, ex.
emergency button or mobiles for blind and partially sighted people
➔​ Smartphone
◆​ Small computers with Wi-Fi and mobile connectivity to make phone calls and
access the internet
◆​ Includes features of other devices such as camera, media player and games
console
◆​ Applications (programs that allow a user to perform a task) can be
downloaded to customise their smartphones.
◆​ Virtual keyboard is used to enter text, numbers, etc.

Tablets
Bigger than smartphones but have similar features; touch screen, apps and Wi-Fi
connectivity. Some have SIM card slots so they can stay connected while not on Wi-Fi.

Cecilia Jones Maganto


1
ICT iGCSE Revision
Cameras and camcorders
Use light sensors to capture images formed by light passing through the device’s lens.
Traditionally, cameras capture images and camcorders film. Now digital cameras can film
and photograph.
Quality of image depends on:
-​ Quality of lens
-​ Allows light to pass through without defects
-​ Image processor
-​ Compensates for poor lighting
-​ Resolution of the sensor
-​ Can capture more detail and produce images with more pixels

Home Entertainment Systems


-​ Television
Display still/moving images on a screen, quality set by number of pixels used = resolution
Horizontal pixels x vertical pixels, UHD = 4K/8K
Smart televisions use apps and can download and stream content from the
internet.
Most televisions come with built-in speakers, often small and of limited quality because the
screen is thin. Can be connected to external sound systems to improve their sound quality.

-​ Sound systems
➔​ Produce loud, rich sound using high quality speakers and amplifiers
➔​ Can play music from CDs or local storage
➔​ Connected to personal devices: (smartphones, media players, and tablets)
with USB or Bluetooth.
-​ Personal video recorders
Device that records broadcasted content to be watched at a later date
Eg. set top box - sends video and audio received from a broadcaster to a television

-​ Blu-ray and DVD players


Connect to televisions to play films and content stored on DVD or Blu.ray disks

Cecilia Jones Maganto


2
ICT iGCSE Revision
Blu-ray stores HD movies - higher quality picture and sound

Game consoles
➔​ Designed to enable users to play video games on a television screen
➔​ Games are provided on disks or as downloads from the internet
➔​ Use controllers, often wireless to control characters, vehicles, objects

Consoles use motion sensors to allow the player to control the game with gestures and body
movements. VR controllers to immerse the player in realistic gaming experience, they have
an avatar in the virtual world.

Media players
-​ Provide video and audio content to a television
-​ Could be direct from the internet or accessed from networked or local storage
-​ Connects directly to wireless / wired connection
-​ Use a remote control or smartphone app to control
Often use solid state flash memory - not affected by being moved or shaken.

Navigation aids
Calculate the best route between two or more locations and can provide updates to the
route if not followed accurately. Used in all vehicles.
Provide visual prompts and alerts
Specialist devices with audio alerts and waterproof/shockproof available for all

Use info from GPS satellites to determine the exact location of the device on Earth. Maps
are either stored permanently on device or downloaded from the internet when they are
needed
GPS doesn’t require the internet to work but navigation does

Home automation devices and smart assistants


Smart homesCan connect a range of digital devices which sense and control functions in the
home, such as temp and lightning
Functions can be controlled from apps on smartphones or the internet

Multifunctional devices and convergence


Smartphone is a type of mobile phone, primary function = make phone calls.
Phone functions: takes photos, navigation aid, fitness tracker, music player, game console
↑ MULTIFUNCTIONAL DEVICE - device that can perform a range of different functions
↑ CONVERGENCE - when the designs of devices change so that they become similar to
one another
Convergence blurs the distinction between different types of device.
Eg. smartphones and tablets

Cecilia Jones Maganto


3
ICT iGCSE Revision
-​ Both now connect to mobile phone network connectivity

Features of Digital Devices

Portability
Easy to carry and move around, related to its size and weight

Performance
High-perf. Does job or tasks quickly, it is determined by the speed of the processor which
carry out software instructions.

Instructions loaded into the processor from RAM.


Faster + more RAM = faster system, allows more programs running at same time, faster
storage.
When space in RAM runs out, storage uses virtual memory. Software can be written in
efficient way to make the most of processor capability, or slow down the whole system.

Storage
Files and programs stored in storage.
More storage = more files and programs can be stored
Storage speed affects performance.

User interface:
Users give commands to devices through it.

➔​ Command line interface (CLI)


= Users enter text instructions and the computer gives results as text
-​ Usually a help menu for users that lists and explains commands


-​ Found on older devices, with limited storage


Requires little memory
Commands must be precise because interface only recognises certain ones

➔​ Menu-driven interface
= Displays a list of options as a menu, triggering a command of menu with further options to


choose.


Easier to use than CLI
More time consuming as you have to go through the whole menu structure.
-​ Used in devices ATMs, televisions and older mobile phones.

➔​ Graphical user interface


Controlled by a pointer on the screen and uses screen made up of windows, icons, menus


Easiest to use
takes up more memory + storage than the CLI and menu-driven

Cecilia Jones Maganto


4
ICT iGCSE Revision
Windows
-> areas of screen from apps or operating system tasks
Icons
-> small image represent an app, selected with pointer to open app
Menus
-> provide options for tasks from operating system / open application

➔​ Voice interface
Allows the user to give spoken commands to a device
Voice recognition software matches the spoken words with a library of words to find a match.
Requires internet access since library is online to not take up storage


Disadvantages:


Software isnt reliable - cannot find match or return unwanted results.
Requires internet access
-> voice interface checks instruction with user before searching
-> use results of confirmation to learn voice of user and improve future results


Advantages:


(Library is online to save storage)
Hands free option is possible
Eg. Often used in vehicles to improve road safety

➔​ Gesture interface
Allow user to control the device by swiping or pinching their fingers across the screen
Found on devices with touch screen
_________________________________________________________________________

Connectivity
Devices can share data by connecting to each other using wire or wireless connectivity
Can be used to:
-​ Update software
-​ Back up files
-​ Play media
Different connectivity types provide different speed of data transfers + levels of convenience

Advantages Disadvantages

✅Faster ❌Additional cost


More reliable ❌Mess
❌Inconvenient
❌Safety risks eg tripping Faster

Cecilia Jones Maganto


5
ICT iGCSE Revision
Media support
Different devices can read data from and write data to different types of media.
Examples of media:
-​ SD + microSD - flash memory cards
-​ DVD
If device doesn’t have built in, adapters can be connected to insert media

Energy consumption
D.D require electricity to work
Lower energy consumption = longer battery life
Due to rising cost of energy and pressure from customers + govt. to be more
environmentally responsible, creating devices that consume less.
-> Aim
●​ save money
●​ demonstrate social responsibility
○​ Reduce environmental damage

Expansion capability
Some PCs allow user to install additional components with expansion slots - make use of
flash memory cards
Systems can be expanded using USB ports (connect peripheral devices)

Security features
Devices need to keep users’ data safe and prevent unauthorised access

➔​ Software security
PIN to access device
Locks screen after not being used for a period of time, password required to unlock
If incorrect password entered, user must wait set time to try again
After several failed attempts, systems can wipe data
-​ -> prevents criminals from guessing combinations to break in

Passwords should be long and complex


Pattern PINs = allow users to set a swipe pattern on points.
-​ 4 digit pattern is better than 4 digit PIN
Biometric scanners = provide authorised users access to data

➔​ Physical security
Prevent theft
Devices use:
-​ security slots with locks attached to secure them to furniture
-​ specialist slots
-​ ports with special screws

Cecilia Jones Maganto


6
ICT iGCSE Revision
Types of peripheral devices
Peripheral devices = devices that can be connected to a computer eg. PC or tablet.

Input devices
Devices that send data to the computer
Allow user to control the computer or store data captured from sources outside the system

➔​ Keyboards
- Use keys to input text or interact with software
Send data to the computer
Can be wired or wireless
Combinations of key presses -> access software commands called shortcuts
Touch-type - typing without looking at the keys -> increase speed of data input

➔​ Pointing devices
Use on screen to select displayed objects
●​ Mouse
○​ Use optical sensor to recognise momentment of device
○​ Can be affected by the surface upon which it is placed some use roller balls
●​ Tracker ball
○​ Rolled to move pointer, no buttons
●​ Trackpad
○​ Surface senses finger movement + touch
●​ Joystick
○​ Used on game controllers
○​ Move sprites around game
●​ Graphics tablet
○​ Flat pad + stylus
○​ Pen used to draw/write on tablet
○​ Used by digital artists + designers

➔​ Scanner (OCR + OMR)


Use light sensors to record physical docs into images then saved as files to the computer
OCR (Optical Character Recognition)
-​ Read characters on documents and store them in a text file
OMR (Optical Mark Recognition)
-​ To detect simple marks on a document
-​ Eg. recognise + record responders for multiple choice tests

➔​ Barcode scanner
Reads pattern of lines and gaps detecting the widths
Represents letters and numbers to identity item
Used on parcels or items in shops

Cecilia Jones Maganto


7
ICT iGCSE Revision
Types of barcode:
●​ Linear
●​ Matrix (QR codes)
○​ Can hold much more info than linear
○​ Can be scanned from any angle

➔​ Webcam
Specialised cameras with built-in microphones to capture sound
Generally lower quality than camcorders
Can be used as security cameras + stream media to the internet

➔​ Microphone
Used to capture sound
-​ Diaphragm moves when air hits producing analogue electrical signal
-​ Mic acts as analogue to digital signal converter
-​
Small low quality ones are built into computers and used for voice recognition allowing VoIP
calls using Skype/Google Meet
Higher quality used by recording artists

➔​ Touch screen
Types:
●​ Resistive
○​ Pressing causes two layers beneath screen to touch and make a connection
■​ More durable than the other
■​ Harder to read because layers reflect more light
■​ Not suitable for multi-touch because only recognise one touch at a
time
●​ Capacitive
○​ Pressing causes small charge flows away from finger because humans are
conductive
○​ Chagre is measured precisely and locate exactly where screen touched
■​ Used in smartphones

➔​ Biometric scanner
Measure part of unique physical characteristics of user multiple times until average result
produced. Average is stored and future sample compared to it to check if it is the authorised
user -> allows info to be updated so saved sample is perfect

●​ Fingerprint recognition
○​ Reads patterns on fingerprint because they are unique to each individual
person.
○​ Can be obscured, damaged or changed because of injury/disease

Cecilia Jones Maganto


8
ICT iGCSE Revision
●​ Facial recognition
○​ Identify structure of human face
●​ Voice recognition
○​ Require microphone
○​ Compare voice print to saved original
●​ Iris recognition
○​ Has unique pattern
○​ Iris scan is much more detailed and reliable than a fingerprint

➔​ Card readers
Read data stored on a card carried by user
Can unlock doors, track things, make payments, access areas
Types:
●​ Magnetic strip
○​ Least secure
○​ Can be easily stolen and take money out
●​ Programmable chip
○​ Only readable when PIN entered into reader
○​ Helped reduce fraud
●​ RFID (Radio Frequency Identification) + NFC (Near Field Communication)
○​ Short range wireless comm method
○​ Cheap+small - in cards, key fobs, smartphones
○​ Contain unique ID linked to records in a database
➔​ Sensors
Input data about physical environment without need of human action -> output processed by
a computer
Main features of smartphones and homes.


Benefits:


can be placed in remote/dangerous locations


monitor continually


remove possibility of human error


sense things people cannot eg. changes in gas/pressure
data easily converted into digital

Cecilia Jones Maganto


9
ICT iGCSE Revision
Different sensors monitor different environmental factors such as:
-​ Light
-​ Moisture + humidity
-​ Temperature
-​ Distance + proximity
-​ Motion + movement
-​ Pressure

➔​ Monitor
Allow users to see output from computer on electronic display
Features:
-​ Screen size
-​ Resolution (pixels)
-​ Energy efficiency (low-power mode)
➔​ Printer
Types:
●​ Dot matrix (impact printer)
○​ Print made by hitting/impacting paper with ribbon of ink
○​ Paper often has n. of carbon copy so it can make several copies at a time
●​ Inkjet
○​ Use cartridges with different colours: cyan, magenta, yellow
○​ Tiny dots spray on paper
●​ Laser
○​ Rotating cylinder/drum holding electrical charge
○​ Laser discharge certain points on drum to draw
○​ Electrically charged toner attracted to points on drum and heated on the
paper

➔​ 3D printer
Create real-life versions of digital models. Work by adding layers of heated material all the
way to the top. Take a long time to create.
Used to create complex items like working parts, eg. artificial limbs, prototype cars

Cecilia Jones Maganto


10
ICT iGCSE Revision
➔​ Plotter
Draws high quality images created in CAD software onto large sheets of paper by moving
the pen across and the pen can be raised and lowered. Some can roll paper forward and
backwards.

➔​ Data projector
Used for home entertainment eg. watching tv, playing games, presentations.
Features:
●​ Light bulb
○​ Expensive to replace
○​ Different brightness levels
●​ Resolution
○​ Use different quality screens
●​ Zoom functionality
○​ Enlarge image with optical or digital zoom
●​ Portability
○​ Some lighter and smaller are available -> easy to move around

➔​ Speaker
Allow a computer to output sound

Pairs provide -> stereo sound: comes from left to right


Multiple -> surround sound: from all around so feels like real life
Single -> small, low quality, found in alert systems

Speakers need special amplifier provides different lvls of sound -> spatial awareness

➔​ Control device / actuators


Components of a system that make something happen in physical world - often mechanical
Examples:
-​ Valves
-​ Pistons
-​ Heaters
-​ Coolers
-​ Motors

Secondary storage
Not RAM or ROM
Non-volatile = will not lose data when system’s power is turned off
Used for:
-​ Storing document for future use
-​ Storing application ready to load into RAM
-​ Virtual memory

Cecilia Jones Maganto


11
ICT iGCSE Revision
➔​ Devices
Used to store data or software used in a computer system
Can be int. or ext.
Internal connect directly to motherboard
External connect to motherboard through ports and adapters on exterior
Types:
Hard Disk Drives (HDD)
●​ Contain hard disk media
●​ Provide connection from disk to motherboard
○​ Directly or using wireless adapter WiFi or port with USB
Solid state drives (SSD) / flash drives
●​ Contain flash memory media
●​ Otherwise identical to HDD
Optical disk drives
●​ Contain optical disk media
●​ Newer often compatible with older media
○​ Backwards compatibility
■​ Ability to be used with older technology without having to be specially
adapted
➔​ Media
Hard disks
Made up of concentric platters making up a cylinder that spins on a central spindle.
Read/write head moves on an arm across tracks of the platter.

Amount of time it takes for the head to access data on tracks determines how fast the
cylinder spins and how fast the head moves across the tracks.

When reading, the head changes the magnetic field into electrical current.
When writing, transforms electrical current -> magnetic field

Avg seek time is 4-15 milliseconds

Optical media
●​ CDs
○​ Store up to 700MB
○​ Written to disk using laser
■​ Writes data to a plastic layer beneath layers of aluminium and acrylic
●​ DVDs
○​ Look like CDs
○​ Data written to DVDs use shorter wavelength of red laser light -> allows to
store more data
○​ Store 4.7GB single-sided, single-layer disk
○​ Double-sided disk store 18GB
●​ Blu-ray
○​ Use scratch-protection coating
○​ Violet laser rays used to store data at grater density than the red laser
○​ Can store 25GB on single

Cecilia Jones Maganto


12
ICT iGCSE Revision
○​ Double sided store 50GB
All optical media recordable known as CD-R + DVD-R + BD-R
Can be rewritten CD-RW + DVD-RW
Blu ray can be written/erased - BD-RE

Flash media
More energy efficient than hard disks because dont have moving parts
Less likely to fail when moved around
More portable
Magnetic tape
Originally designed to record sound, can store data

Storage media stores data in binary. Bit = 0 or 1


-​ Hard disk change charge of platter to negative/positive
-​ Optical media use tiny bumps on disk surface
-​ Flash media use different lvls of electrical charge in tiny cells
-​ Magnetic tape changes charge of tape to negative/positive

Cecilia Jones Maganto


13
ICT iGCSE Revision

Unit 1: Digital Devices

Chapter 2: Software
System Software
Designed to maintain or operate the computer system.

Utility system
Carries out configuration and maintenance tasks
Backup
Creates a copy of files and programs, can be automatic
Defragmentation
Spreads fragments of data across disk where there is free space
Compression
Reduce the og size of a file to reduce storage space
Formatting
Prepares storage media for its first use for user

Operating system
Allows user to control and manage computer hardware
➔​ Single user : for general user, can’t be customised eg. household appliances
➔​ Network:
◆​ Send request to server when log in
◆​ Separate user accounts
◆​ Provide access to network storage and resources eg printers
Memory management
Allocating the required amount of memory to one or more applications, when not in use,
makes it available to other apps.
Handles creation of virtual memory

Resource management
Ensures system resources are made available to apps when requires, if in use then the
request adds to queue

Security
Requires authentication, provides a firewall to authorise access.

Print spooling
Process of keeping pages queued in order, ready to be printed

Application software
Apps allow users to produce a digital product.

1
ICT iGCSE Revision
Office productivity software
On application suite = collection of apps that share same look, user interface, data and
functionality
Word processing
Lets users create docs including text, pics, hyperlinks, tables, graphs and equations
Good for making letters, reports and essays
Let docs be collaborative and track history.

Desktop publishing
Sames as word but users use complicated page layouts

Spreadsheets
Used to calculate with formulas

Database
Features:
●​ Data entry forms
●​ Query editors
●​ Report builders

Presentation software
Create engaging multimedia content on slides to support a talk or topic
Timing can be set manually

Web authoring
Lets users create web pages that include text and graphics.
HTML translate browsers into pages - browser eg Google Chrome
People can see it on the intranet or web server.

Image editing
Lets users create and change bitmap images.
Graphics editors - allow user to create and edit vector pics
Features:
●​ Vectorising images
●​ Layers
●​ Adding text
Photo editors - allow user to edit/enhance digital images
Features:
●​ Adjust brightness + contrast
●​ Resizing image
●​ Cropping

Sound editing
To edit audio files or join tog different audio files for multitrack
Features:
●​ Cut/join audios

2
ICT iGCSE Revision
●​ Mute and solo tracks
●​ Change tempo
●​ Add reverberation
●​ Apply audio processing
○​ Normalisation = increasing the average volume of audio to a defined max
○​ Noise reduction
○​ Reverse
○​ fades

Control applications
To make something happen in physical environment, with devices like motors.
Receives info from sensor and makes a decision based on input value
Used in engineering, vehicles and home automation systems.
-> devices monitored using smartphone app
Created by programmers rather than general users, not eas easy to modify.

Project management
Apps track tasks, show dependencies, set timelines, milestones, and allocate resources
efficiently to individuals or groups to more than one task.

Communication software
= Enables remote access and allows file and message sharing via the internet.
●​ Web Browsers
○​ Access web pages, FTP (filee transfer protocol) servers, and internet
systems.
●​ Email
○​ send and receive messages
○​ Client-server model
○​ manage contacts
○​ use webmail or offline storage.
○​ organise with filters
●​ Social Media
○​ accessed via browsers or apps
○​ enabling multi-account management
●​ SMS
○​ sends text via mobile networks without internet.
●​ MMS
○​ extends SMS to include multimedia like images and videos
○​ without internet
●​ Instant Messaging:
○​ requires internet
○​ supports real-time typing indicators
○​ share location data.

3
ICT iGCSE Revision
Software licensing
Free/Open-Source:
●​ Users can study, modify, and redistribute software - free
●​ Open source liceneses make the source code available to users - open-source

Proprietary:
●​ Software marketed and distributed by the owner under brand name.
●​ Can decide fee for software, if free = freeware
●​ Using unlicensed software is considered piracy.

Software updates
Updates released by developers to:
●​ Fix vulnerabilities/bugs
●​ Increase compatibility
●​ Improve usability
●​ Introduce new features

Some happen automatically, or available to download from a server on the internet.


Important to backup files in case a new update has a problem and removes components to
function.

End of Chapter Questions:


1.​ Define ‘application software’
Piece of software you can use to carry out specific tasks that aren’t related to the operating
systems.

2.​ State three types of utility software


●​ Backup
●​ Antivirus
●​ Defragmentation
●​ Compression

3.​ Describe the role of the operating system


Allows the user to control and manage the computer’s hardware.

4.​ Explain why utility software allows the user to schedule backup processes
So backup processes can be completed when the system isn’t being used to avoid file
conflicts.

5.​ Explain the benefit of using compression utilities to archive files.


Compression utilities can free up storage space by reducing the amount of data needed to
store a file.

4
ICT iGCSE Revision
6.​ Describe how presentation software can help a presenter to give a talk
By allowing the user to create slides that contain content that support their talk.

7.​ Describe one use of control software in a relevant industry


Control software could be used in manufacturing factories to control robots on a production
line.

8.​ Discuss why a building company might use project management software
Companies must adapt to scheduled timelines because multiple resources such as materials
and staff such as engineers need to be coordinated in phases which are dependent upon
each other.
The software ensures that the project hits its targets and forecasts for completion can be
provided, with progression monitored so that stakeholders can be updated with progress.

9.​ State three types of service provided by communication software


●​ Web browser
●​ Social media
●​ SMS
●​ Email

5
ICT iGCSE Revision

Unit 1: Digital Devices

Chapter 3: Memory and Processors


Memory
Memory used to store instructions so that the processor can fetch the instructions quickly in
order to process them.
Main memory is what is directly accessible by the processor.
->RAM - volatile
->ROM - non volatile
->Flash Memory - non- volatile

Volatile memory = means data is retained in RAM as long as the computer is on, but it is lost
when the computer is turned off
Non-volatile memory = means after power on the devices is turned off, the data is not lost.

RAM = Random Access Memory


●​ Volatile = doesn’t store data when it has no power
●​ Where the operating system, application programs and data in current use are kept
so they can be quickly reached by the device’s processor
●​ When a program or file is opened it is copied from the storage into RAM.
- More RAM allows running more programs simultaneously.
- Insufficient RAM forces the system to use slower virtual memory, reducing performance.
- SSDs are faster than hard drives but frequent swapping still impacts performance.
- Closing programs frees up RAM, improving active program performance.
- Adding RAM improves multitasking and supports memory-intensive updates, limited by
system capacity.

ROM = Read Only Memory


-> Non-volatile - stores data permanently, can’t be changed or modified.

1
ICT iGCSE Revision
Contains instructions needed for the computer to boot up and run its programs.
Used in single-purpose devices and general-purpose computers for booting systems.
Types of ROM:
○​ ROM: Data cannot be changed after manufacturing.

○​ PROM: Programmable ROM; writable once.

○​ EPROM: Erasable PROM; erasable with UV light.

○​ EEPROM: Electrically Erasable PROM; erased with voltage, without removing


the chip.

●​ EEPROM evolved into flash memory, used for updating firmware on devices.

Flash Memory - type of EEPROM


-> Non volatile
Fast access time and low power consumption.
Used SDDs in portable devices or removable storage

Storage:
8 bits = 1 byte
1 kilobyte = 1024 bytes
1 megabyte = 1024 kilobytes
1 gigabyte = 1024 megabytes

Processors
Carry out software instructions
Made up of 1+ CPUs - referred to as a core
Processor cycle = fetching program instruction from memory, decoding actions required by
instruction and executing.
Processor speed measured in clock cycles per second -> clock cycles measured in hertz
Construction of a expression

End of Chapter Questions:


1.​ Define ROM
Read Only Memory
2.​ Define RAM
Random Access Memory
3.​ Explain why increasing amount of RAM in system improves user experience
Means more programs can be open at same time, without needing to use virtual memory
from storage which is slower than RAM
4.​ Describe virtual memory and why it’s used

2
ICT iGCSE Revision
An area of secondary storage used to store data when the computer system doesn’t have
enough space in RAM
5.​ List three characteristics of RAM that make it different from ROM
●​ Volatile
●​ Temporary storage
●​ Upgradable
6.​ Give 2 reasons why characteristics of flash memory make it suitable for use as
secondary storage in smartphones
Doesn’t have moving parts so lower power consumption, doesn’t loose data easily if device
is knocked.
7.​ Describe clock cycle
Number of times per sec that a processor can carry out instructions.

3
ICT iGCSE Revision

Unit 2: Connectivity

Chapter 4: Digital Communication


Speed and Volume of Data Transfer

Bandwidth
Speed at which devices can transfer depends on bandwidth

Impact on user experience


Higher bandwidth = more data transferred more quickly
When streaming video all data doesn’t have to be downloaded before playback can start and
the portion is stored in a buffer.
Buffer
= area used to temporarily store data, specifically when streaming video.
While video plays more data downloads in buffer, if buffer is empty then no more video to
play and will pause until more data downloaded.
_________________________________________________________________________

Latency
Amount of time it takes to send data between devices. Can be detected with domain.
Domain
= Name used to identify a web server
Ping a domain ➞ send packet of data ➞ packet returned by server to og device.

Impact on user experience


In gaming, game will play smoothly if bandwidth adequate. If latency is high game will lag.
_________________________________________________________________________

Factors that affect speed and volume of data transfer


●​ Transfer method
○​ Have to work on a limited n. of frequencies. Copper carry more than wireless.
Cabled have more bandwidth available.
●​ Interference
○​ Other electromagnetic signals disrupt or interfere with signals. Cables
connections can be shielded from thai interference by having wire wrapped in
thin metal.
●​ Blockages
○​ Walls and furniture reduce the strength of wireless signals, reduces
bandwidth
●​ Distance
○​ Strength is reduces as distance it has to travel increases

1
ICT iGCSE Revision
Device-to-Device communication
Can connect directly to each other using wired/wireless methods.

Network Communication
LAN (Local Area Network)
Connects digital devices that are in a small geographical area.

WAN (Wide Area Network)


Network that is spread over a large geographical area. Eg. Law enforcement agencies,
health and education organisations.
WANs use connectivity provided by linking LANs together through the internet.

PAN (Personal Area Network)


Group of connected devices thar are all near an individual user. Eg. connect smartwatch to
smartphone.

Tethering
Process of connecting a host device that uses a mobile broadband connection with one of
more devices. Part of the service agreement.

2
ICT iGCSE Revision

Ways how digital devices communicate


Satellite communication
Satellites transmit data to and receive data from digital devices that use antennae to receive
radio signals they transmit. The benefit is that the number of satellites means that the
system is always available.

GPS
Satellite communications are used for GPS.

Television
A satellite television viewer will have an antenna installed, and this receives the signal and
sends it to a set- top box. The set-top box decodes the signal and converts it so that it is
ready to be sent to a television.

Telephone
Satellite communication is also used to allow people in remote areas to place voice calls
using satellite telephones.

Broadcast communication
Analogue television and radio

Transmitters broadcast television and radio signals that are received by a viewer's antenna.
This antenna sends a signal through a wire to the television or radio receiver, which converts
it into images and audio.

Wired communication

Ethernet
= a network connectivity standard that provides a way for computer to communicate

3
ICT iGCSE Revision

Wi-Fi
= A wireless technology used to connect devices to a network. That network can be
connected to the internet, so that devices connected to the Wi-Fi network can connect to the


internet.


long range


high bandwidth


high security
can connect to multiple devices simultaneously

❌ high power
9Pair
= connect two devices (usually only with each other)

Bluetooth


= a type of wireless connectivity that lets devices connect over short distances.


cannot carry as much data as Wi-Fi


short range


low bandwidth


low security
devices need to be paired with each other before they can communicate

✅ low power
3G + 4G

-​ 3G and 4G are sometimes referred to as mobile broadband.


-​ G stand for “generation”
-​ Future generations of the technology are planned to improve the speed and
availability of the signal.

4
ICT iGCSE Revision

Infra-red
=a type of electromagnetic radiation with a larger frequency than that of visible light
-​ can only carry much data and only have a short range.
-​ It is often used in remote-control devices such as television remote controls.

Benefits and drawbacks of wired and wireless

Broadband, mobile broadband and cellular networks


Internet Service Provider
= a company that provides customers with access to the internet

Fibre optic cable


= a cable that sends data using light signals

5
ICT iGCSE Revision
Copper cable
= a cable that sends data using electrical signals, which are conducted through copper
wires.

End of Chapter Questions:


1.​ a) Explain one reason why some games console controllers use Bluetooth rather
than infra-red to connect to the console.
One reason why some games console controllers use Bluetooth rather than infra-red is
because Bluetooth does not require a direct line of sight to work. This means the player can
use the controller even if something is blocking the path between the controller and the
console, making it more convenient and reliable during gameplay.

b) State one way in which using infra-red in games console controllers affect the
experience of the person playing the game.
Using infra-red in games console controllers can affect the experience by requiring a direct
line of sight between the controller and the console. If something blocks the signal, the
controller may stop working, which can interrupt gameplay and make the experience
frustrating for the player.

2.​ Describe how video streaming works.


Video streaming works by sending small parts of a video over the internet to your device. As
the data arrives, your device plays the video while continuing to download the next parts, so
you can watch it without waiting for the whole file to download.

3.​ Explain why streaming is more convenient for the user than downloading
Streaming is more convenient than downloading because the user can watch or listen
instantly without waiting for the whole file to download. It also saves storage space on the
device since the file isn’t permanently saved.

4.​ State three types of wired connection


-​ Ethernet
-​ HDMI
-​ USB

5.​ Which one of these best describes the internet?

A LAN
B WAN
C PAN
D VLAN

6.​ Explain why global games companies use games servers in multiple countries to
ensure that the experience of users is not negatively affected when playing onñine
games.

6
ICT iGCSE Revision
Global games companies use game servers in multiple countries to reduce lag and
improve connection speed for players. When a server is closer to the player, data doesn't
have to travel as far, so the game responds faster. This helps ensure a smoother, more
enjoyable experience with less delay, especially in fast-paced online games.

7
ICT GCSE Revision

Unit 2: Connectivity

Chapter 5: Networks

Requirements for connecting to networks


Protocols
Rules that allow the exchange and transmission of data between devices

Network operating systems


A network operating system allows a computer to communicate on a network. It provides
additional functionality to a stand-alone operating system, including:

●​ Passing usernames and passwords to a server for checking when a user logs
in
●​ Separating user accounts and ensuring that users cannot access each other's
files
●​ Providing access to network storage and shared resources such as
networked printers.

How devices are identified on a network


There are three methods used to identify devices on a network:
• Internet Protocol (IP)
• MAC address
• device name.

IP address
unique address that networked devices use to send data to each other. Each piece of data
that is sent across a network carries the IP address of the destination, so that each device in
the network knows where to send it.

• IPv4 uses four groups of up to three numbers separated by full stops (for example,
192.168.1.1).

• IPv6 uses eight groups of four hexadecimal numbers separated by colons (for example,
2001:0db8:0000:0042:0000:8a2e:0370:7334).

IP addresses can either be assigned by a network administrator or allocated dynamically by


a server running Dynamic Host Configuration Protocol (DHCP).

1
ICT GCSE Revision
Mac address

Unlike IP addresses, which can be dynamically allocated by users or servers, media access
control (MAC) addresses are universally unique identifiers given to the network interface
card (NIC).

MAC addresses are used in devices connected to local area networks (LANs) using
Ethernet, Bluetooth or Wi-Fi.

MAC addresses are assigned by the NIC manufacturer and are generally considered to be
fixed addresses.

MAC addresses are usually made up of six pairs of characters. The first three pairs identify
the manufacturer and the remaining pairs are assigned by the manufacturer to uniquely
identify the device. Figure 5.6 is an example of a MAC address.

Universally unique
the only one of its kind in the world

Identifier
a group of letters, numbers, or symbols that a computer has been programmed to recognise
and use to process information.

Components of wired and wireless systems


Wired and wireless systems can be made up of a variety of components.

2
ICT GCSE Revision

Network operating systems


Cables are used to connect devices in a wired network. In homes and small businesses,
Cat5e cables are used for Ethernet connections. These cables are able to transfer data at 10
Mbit/s, 10 Mbit/s or 1Gbit/s. Cat5e cable connects devices through their NICs. The device's
NIC allows the computer to exchange data with other networked computers and contains
LEDs that signal network activity.

Cat6 cables can be used to transfer data at 10 Gbit/s. These are more expensive than Cate
cables and are usually only used by businesses.

Mbit/s
the amount of data that can be transferred per second, measured in Megabits1( Mb=1
million bits)

Gbit/s
the amount of data that can be transferred per second, measured in Gigabits 1( Gb =
1,000,000,000 bits)

Wireless access points


A wireless access point allows devices with Wi-Fi connectivity to connect to a wired network.
They are often built into other hardware, such as routers (see page 85), but they are also
available as stand-alone devices that connect to a wired network using Ethernet cables.

Switch
A switch connects devices on a network. It has ports, each of which can be connected to a
device using a cable. Connecting a wireless access point to a switch via a cable gives
wireless devices access to the wired network.

Port
A socket into which cables and devices can be plugged.

Gateway
A gateway connects two different types of network. For example, a LAN is connected to a
WAN using a gateway.

Router
A gateway connects two different types of network. For example, a LAN is connected to a
WAN using a gateway.

A router stores the addresses of all devices that are connected to it so that it can forward
network traffic to its destination using the quickest route. Most routers used in homes include

3
ICT GCSE Revision
a switch and a wireless access point. They also act as gateways, connecting the LAN to the
internet, which is a type of WAN.

Booster
A booster is used to amplify the signal in a network so that its range can be extended. For
homes and offices, wired Ethernet connections often have a maximum range of 10 m.
Wireless signals have limited range, too. Boosters can be used for both wired and wireless
connections.

Server
A server is a computer that shares its resources with connected devices. Computers
connected to a server are known as clients. Resources that can be shared by one or more
servers include printers, storage and applications.

➔​ Authentication server
An authentication server checks usernames and passwords. When a user successfully logs
in, the client receives an electronic certificate that it can then use to access various
resources, including applications and storage.

➔​ Print server
A print server manages multiple printers at a time, dealing with print requests from client
computers and adding jobs to a queue so that individual printers are not overloaded with
requests. Print servers can also monitor and process print requests, making sure that users
or departments can be invoiced for the jobs that they send to the printers.

➔​ File server
File servers allow users to access shared and private storage.

➔​ Application server
Application servers provide clients with access to applications that can be run directly from
the server.

➔​ Web server
Web servers process requests for data made via Hypertext Transfer Protocol (HTTP).
Together, all of the content stored on all web servers is known as the World Wide Web.
Client computers often access web servers from outside the LAN to which the server is
connected.

4
ICT GCSE Revision

Connecting to and using the internet


In order to access the online services provided by servers and data centres, users must
have a connection to the internet. Users also need software that allows them to use and
work with the services effectively and safely.

Internet service provider


To connect to the internet, users need to subscribe to an ISP. ISPs provide connections to
the telecommunications infrastructure that forms the framework for the internet. ISPs provide
access via mobile telephone networks and landline telephone networks. Commercial ISPs
charge subscription fees for access to the internet.

Telecommunications infrastructure
the networks of hardware facilities, owned by private and public organisations, that are used
to transfer data.

Web browser
A web browser is a type of software application used to request and display information
stored on web servers. Examples of web browsers are Mozilla Firefox, Google Chrome,
Internet Explorer® or Microsoft Edge, Opera®, and Safari®®.

Search engine
A search engine provides users with a way to find information in web pages stored on web
servers. Users enter keywords that describe the information they want to find. The search
engine then compares the keywords with those in its database of web pages and returns the
results that are the closest match to the given keywords.

Filter software
Filter software prevents users from accessing inappropriate information. When a user tries to
access a web page, the address (URL) and/or the contents of the web page are compared
against two lists of URLs and keywords stored in the filter software's database. The two lists
are the blacklist and the whitelist.

Blacklist
a list of unacceptable URLs

Whitelist
a list of acceptable URLs

5
ICT GCSE Revision
Local area networks (LAN)

Peer to peer networks


Computers in a Peer to-peer network share their resources with other computers in the
network, but they do not access servers.

Client server networks


A network that uses servers and clients is called a client-server network.

Benefits of using LANS


Connecting computers using a LAN provides a range of benefits. These include:

●​ Access to shared peripherals


●​ Access to shared storage and data
●​ Flexible access (that is, being able to access peripherals, storage and data from any
connected device)
●​ Media streaming (including movies, music and gaming)
●​ Communication (that is, being able to send messages and files to others on the
network)
●​ Shared access to the internet.

Securing data on networks

Firewalls
A firewall is used at the gateway to a network. It controls the network traffic to and from a
network, particularly the traffic from the internet. Firewalls prevent unauthorised users from
accessing network devices and resources, such as storage. Firewalls are available as
hardware and software, which can be installed on computers to prevent attacks from within a
network.

Encryption
Encryption is the process of encoding, scrambling or jumbling data so that unauthorised
users are prevented from being able to understand it.

Symmetric key encryption


Symmetric key encryption uses the same key at both ends of the process, meaning that the
same key is used to encrypt and decrypt the data.

6
ICT GCSE Revision

Public key encryption


Public key encryption uses two mathematically related keys called a key pair. One key is
used to encrypt the data and a different key is used to decrypt it.

A computer shares a public key with other computers that want to send it encrypted data.
This public key is mathematically related to a private key, which is not shared.

Wireless encryption protocol (WEP)


Easier to intercept data in wireless networks than wired networks.
This ensures transfer
Least secure wireless data encryption method -> every deceive on wireless network uses
same key
If eavesdropper studies enough packets they can identify key and get unlimited access to
data from every device on wireless network.

Wi-Fi protected access (WPA)


Security protocol to provide better encryption than WEP.
Generates new keys for each device on wireless network.

VPN (Virtual Private Network)


Provides access to private LAN from remote location using infrastructure of a public network
eg Internet.
Data sent is encrypted so secure if intercepted
Used to:
●​ Access employer network when home
●​ Access computer in dif. geographical location to avoid local restrictions on the web
○​ Eg. censorship / geolocation rights management
●​ Make secure payments
●​ Prevent surveillance of web activity

File access rights


= File permissions
Set for files, folders or drives
Ensure users are allowed to read only or edit

Transaction logs
All network activity recorded in log file, does not directly secure network data.
Allows administrators to identify any unusual activity that could be threat to data security

Backups
Copy of one or more files. Usually stored on dif storage device to the original file

7
ICT GCSE Revision
End of Chapter Questions:
1.​ Which one of these connects a LAN to a WAN?

A. Switch
Answer: B. Gateway
C. Modem
D. Server

2.​ Explain why public key encryption is more secure than symmetric key
encryption.​
Answer: Public key encryption uses two keys: a public key to encrypt data and a
private key to decrypt it. Only the private key holder can decrypt the data, reducing
the risk of interception compared to symmetric key encryption, which uses the same
key for both encryption and decryption.

3.​ State which security device controls the traffic entering a network.​
Answer: Firewall
4.​ State two methods by which devices are identified to each other on a network.​
Answer:
○​ IP addresses
○​ MAC addresses
5.​ Explain why IPv6 was used to replace IPv4.​
Answer: IPv6 was introduced to provide a much larger address space because
IPv4’s 32-bit address system could not accommodate the growing number of
internet-connected devices. IPv6 also offers improved efficiency and security
features.
6.​ State two uses for a VPN.​
Answer:
○​ Securing data transmission over public networks
○​ Accessing restricted content or bypassing geographic restrictions

7.​ State the reason why a booster is used in a network.​


Answer: A booster is used to extend the range of a network signal, ensuring better
connectivity in areas with weak or no signal.

8.​ Describe how encryption secures data.​


Answer: Encryption secures data by converting it into an unreadable format using an
algorithm. Only authorized users with the decryption key can decode the data,
preventing unauthorized access or interception during transmission.

8
ICT GCSE Revision
9.​ List three methods of securing data on networks.​
Answer:
○​ Using firewalls
○​ Encrypting data
○​ Implementing strong passwords and authentication protocols

10.​State three benefits to users of using a local area network.​


Answer:
●​ Enables file and resource sharing (e.g., printers)
●​ Facilitates communication between connected devices
●​ Provides faster data transfer speeds compared to external networks

11.​Draw and label a network diagram for a home that includes two smartphones,
one tablet device, two desktop PCs, and internet access.​
Answer: A home network diagram should show:
●​ A central router connected to the internet
●​ Two smartphones connected wirelessly to the router
●​ One tablet connected wirelessly to the router
●​ Two desktop PCs connected to the router (either wired or wirelessly)

9
ICT iGCSE Revision

Unit 3: Operating Online

Chapter 6: Risks to Data and Personal Information


Risks to data and information

Unauthorised access
= access to networks by users who are not permitted to access them.
Malware
= (malicious software) software that is created with the intention to do them

Deliberate damage by malware


Some malware/ransomware threatens to delete a user’s files or places restrictions on a
user’s access to software or resources until money is paid, usually to an anonymous account

Very threatening and distressing for users putting pressure before they have time to think
about the threat and manage it

Accidental deletion
This happens if:
-​ They press a key on keyboard by accident
-​ Format media on wrong storage device
-​ Device loses power unexpectedly

Theft of personal data

➔​Phishing
A technique used by criminals to get personal information and payment details from
users.
➔​ Either large n. of messages on SMS or emails from ‘real’ organisations.
➔​ Emails have a hyperlink which asks for users' info.
Spear phishing -> can be highly customised/personalised to target particular users

➔​Pharming
= to gain personal info and payment details from users on fake versions of trusted
websites
Main methods to direct users:
●​ Internet traffic
○​ Going to real website redirects to fake websites by altering domain name
servers
○​ Use malware to redirect web requests

Cecilia Jones Maganto


1
ICT iGCSE Revision
●​ URL designed to be very similar to real, so if user misspells the url when typing in
address bar -> go to pharming site by mistake

Methods to secure data + personal information online

Firewalls
= Control data travelling in and out of a network
Examine network addresses and ports of data and compare to list of rules set by network
administrators to prevent unauthorised access or malware from network

Encryption
Uses a key to scramble data into an unreadable form, if intercepted they must identify the
key

Passwords, pins and biometrics


Used online to authenticate users so they have access to online systems
Must be:
-​ More than 8 characters, uppercase + lowercase
-​ Mix of letters, n. and symbols
-​ Random characters
-​ Changed frequently

When enter pin they are often masked so anyone looking cant see what's typed with ****
Some allow passwords to be remembered but not recommended.

Network operating systems are more secure and will not allow different users to see each
other’s stored passwords

CAPTCHA tests and security questions


CAPTCHA - computer program or system identify whether user is human or bot

Work by asking users to enter a randomly generated series of letters and numbers are
displayed on the screen
reCAPTCHA use extracts of text from scanned books or images that share common
features
-> make more books available online + improve info in online maps

Anti-malware
Prevents malware from accessing/operating on computers by scanning files

➔​Anti-virus
Virus = malware that uses networks to spread to connected devices via
communication software or being loaded into memory from external storage

Cecilia Jones Maganto


2
ICT iGCSE Revision
Often look like normal files but each have unique virus definitions (computer code) but has to
be updated regularly

Checks files downloaded and uploaded, if infected it gets quarantined


-> isolated in protected area of storage so can’t harm other files

Often combined with software that protects against adware and spyware

➔​Anti-adware
Adware displays unwanted adverts to users, anti-adware removes it

➔​Anti-spyware
Spware secretly monitors and records computer data and user input
This detects, quarantines and removes it

Access rights and file permissions


Permissions can be set for access to data allowing users to read and write to file
= authorisation settings provide ability for user to access files, folders, drives

Secure websites
HTTP used to exchange data between web server and client but not securely

HTTPS developed to:


-​ Authenticate payment servers
-​ Provides encryption with SSL and TLS
-​ Keeps communication private
-​ Provide security for users’ online accounts
-> website secure by displaying green padlock

Email attachments and web links


Users should be careful when opening emails or hyperlinks because they can be fake
Be careful if:
-​ Don't recognise sender
-​ Text is generalised and contains spelling/grammatical errors but urgent
-​ File is executable .exe/.zip
-​ Don't recognise URL

Backup procedures
Create copies of data and store on:
●​ External storage device
○​ makes data secure
■​ stay safe if original is damaged/stolen/lost
●​ Online storage

Cecilia Jones Maganto


3
ICT iGCSE Revision
○​ Data in two dif geographical locations
○​ Slower because uses internet connection

Users decide how many files to back up and how often they should back them up
Regular back ups require more storage space

Loss of files/damage caused by:


-​ Theft
-​ Malware
-​ Flooding/fire
-​ Power cuts

Good ideas for backups:


-​ Set automatically in the evening to avoid conflict
-​ Not use optical media -> deteriorates overtime and fragile
-​ Create more than one copy
-​ Store copies at multiple locations
-​ Store very important data in fireproof safe

Online payment systems


= send payment details across networks to computers that process payments

Online 3rd-party payment processors


Eg. paypal
User create account to send/receive money using email for identification.
Use systems that link with online shops so its easier and faster

Bank cards
Customers pay for goods/services online and in shops
Online you enter the:
-​ Card number
-​ Expiry date
-​ Name on card
-​ Security code (CVV)
Sometimes asked to authenticate payment by entering password in system eg. Mastercard

Contactless cards using NFC


NFC allows transfer of payment data
-​ Doesn’t require PIN or authentication

If card reader in range, contactless will take payment up to max amount


People trying to commit fraud can only steal a small amount because it has a limit
NFCs can be wrapped in foil to prevent weak signal being intercepted by criminals

Cecilia Jones Maganto


4
ICT iGCSE Revision
End of Chapter Questions

1.​ Which one of these is used to control internet traffic entering a network?​
C. Firewall
2.​ Explain why CAPTCHA tests work.​
CAPTCHA tests work by distinguishing between humans and automated bots. They
require tasks that are easy for humans to perform, such as identifying images or
typing distorted text, but difficult for bots to complete.
3.​ State the purpose of pharming and phishing.​
The purpose of pharming and phishing is to steal sensitive information, such as
usernames, passwords, and financial details, by tricking users into visiting fake
websites or providing their personal data.
4.​ List three pieces of data from a bank card that a user is asked to enter when
making an online payment.
●​ Card number
●​ Expiry date
●​ CVV (Card Verification Value)
5.​ Describe one way in which incremental backup differs from differential backup.​
Incremental backup only backs up data that has changed since the last backup, while
differential backup includes all data that has changed since the last full backup.
6.​ Describe how encryption secures data on a network.​
Encryption secures data by converting it into an unreadable format using a
cryptographic algorithm. This ensures that only authorized users with the correct
decryption key can access the original data, protecting it from interception or
unauthorized access.
7.​ State two methods used by an online system to authenticate a user.
●​ Passwords
●​ Two-factor authentication (e.g., sending a code to a user's phone or email)
8.​ State two methods used by criminals to get users to visit fake sites.
●​ Sending phishing emails with fake links
●​ Using search engine manipulation to make fake sites appear in search results
9.​ Explain one disadvantage of using online storage for backups rather than local
storage.
Can be slower to backup because the connection to the internet provides less
bandwidth than a local data connection.

Cecilia Jones Maganto


5
ICT iGCSE Revision

Unit 3: Operating Online

Chapter 7: Impact of the Internet :)


The internet
The internet is not = World Wide Web. The internet is the interconnected network of
computers that provides many online services to
users.
Protocols - rules that allow the exchange and transmission of data between devices
➔​ IMAP (internet message access protocol) -> email
➔​ FTP (file transfer protocol) -> sending files
➔​ SSH (secure shell) -> secure remote logins
➔​ VolP (voice over internet protocol)-> voice call services e.g. Skype
➔​ XMPP (extensible messaging presence protocol) -> messaging services eg.
WhatsApp
➔​ НТТР (hypertext transfer protocol) -> World Wide Web

Impact of the internet on individuals

Information and services


Internet improves users with access to information from news, sport and
weather services. Info can be spread on internet within seconds which means that users
have access to the latest updates. Before the internet, the only services available were TV or
radio.

Users can use the internet to:


➔​ Access booking systems for travel, leisure and entertainment
➔​ Do their shopping and banking
➔​ Study using VLE (virtual learning environments) with online support from teachers
and students.
➔​ Provides wide range of entertainment to on-demand services (movie+music
streaming+downloads+gaming services)

Cecilia Jones Maganto


1
ICT iGCSE Revision
➔​ Add content to web pages (e.g. memes)

Employment
Has had an impact often requiring people to learn new skills so they can change the way
they work.

Skill requirements
Use the internet for work, meaning that employees need to learn new skills.

Eg. journalists submitted work through word processor -> now required to post and update
stories on social media.
Must be able to react quickly to stories which means typing and proofreading skills must be
of good standard to post quickly with no mistakes.

Modern teachers must be familiar with info and services available on the internet to teach
students about them, and help manage the risks they could face online.

New job opportunities as the nature of jobs change


As the internet changes the work people do, new jobs are available.
Eg. plumber is no longer limited to installing and repairing pipes. Homeowners now purchase
smart systems controlled from digital devices using the internet. Anyone can find a job if they
offer modern services.

As the nature of jobs changes and the use of the internet at work grows, skilled
workers are needed to support this development. People are required to train and advise
unskilled workers and to create the digital devices and software that workers use. Other
people are needed to install and maintain the systems used.

Job losses
If employees do not keep updating skills in use of the internet they may not have the skills
required to carry out new work. If they are not willing or able to retrain, they lose their job.

Working practices
Ways in which people carry out their tasks in their job.

Collaborative working
The Internet enables people to connect with each other in real-time. Makes it more efficient,
allows work to be done more quickly. Collaborative working allows work to be split into a
number of individual tasks, each of which can be done by a different person.


Advantages


Each employee can focus on one task
Employees become experts in their narrow area of expertise


Disadvantages


Employees don’t share their skills and expertise
Reduced understanding of the whole project

Cecilia Jones Maganto


2
ICT iGCSE Revision
Internet allows more than one person to work on a task at the same time:


Advantages


Expertise is shared
Employees can check each other’s work


Disadvantages


Can be difficult for lots to agree
Can be difficult to coordinate the work of many employees

Flexible working
Way that suits an employee’s needs. Eg. allows employees to decide the hours that they
work or enables them to work from home. It is possible because employees can use the
internet to access systems from anywhere with an internet connection at any time.


Advantages


Work when right for them + take breaks when needed
Fit their work around their family life


Disadvantages


Don’t meet face-to-face, reduces understanding of each other and employer
May not manage work effectively, could affect home life or cause exhaustion

Flexibility provided enables employees to work when travelling


Advantages


Access up-to-date info
Work from anywhere with internet


Disadvantages


Become exhausted if they work longer hours than usual when travelling
Not have access to same facilities or resources as those in one place

Social impact
Huge impact on the way in which people socialise, thanks to sites like Facebook and Twitter.

Social interaction
Humans are naturally social and require social interaction with others, we feel a need to
connect. The internet allows humans to communicate with any other connected person,
through gaming, video calls, messages and networking sites.

There are concerns about the increasing use of virtual environments replacing face-to-face
interactions. It is damaging people’s ability to talk to each other.

Gives users access to a wider community which makes people more aware of other cultures
and societies: broadens our view on the world. We connect via social network applications.

Cecilia Jones Maganto


3
ICT iGCSE Revision
Cyberbullying
Using the internet to send text, images or multimedia in order to upset and embarrass
someone. Exists offline but online can be even more distressing because info can spread
very quickly and to more people.
Bullies can isolate victims by preventing them from participating online. They usually hide
their identity, making it worse for the victim. Most communication is easily monitored to find
the bully.

Physical activity
Access to online goods and services means that people do not have to leave the comfort of
their homes to do things. Reduced the need to travel and do physical activities - could have
negative effects on health and wellbeing.

Staying safe online

Zip it
Keep personal info private and don’t share it with strangers. Eg. location, school, phone
number, photos, email, name…
You can use privacy settings on social networks to stop strangers from viewing your profile.

Block it
Always block offensive messages or friend requests from strangers on social networking
sites. Do not open suspicious attachments or links, put on search filters to see
age-inappropriate content

Flag it
If something upsets you or id someone you don't know is requesting you. Users can report
grooming to national crime agencies.
Virtual Global Taskforce - international organisation that protects young people online.

Digital Footprint
All the data that a user creates online, which is recorded and stored.
Content can be easily viewed by people you didn't expect. Can be copied and shared easily,
it could become available to anyone.
-​ Would I show this to my parents or grandparents?
-​ Could people misinterpret this?
Minimise footprint by:
-​ Closing old social media accounts and requesting that all archive data is deleted
-​ Search for your own name online and see what info about you is available.

Online working from home


Many businesses have established processes and procedures, including set working hours.
Many organisations also require their employees to work within one or more central offices.

Cecilia Jones Maganto


4
ICT iGCSE Revision
Employees use LANs to access shared storage and resources, but still have to be within the
office in order to do so.

Many modern digital devices can run a range of software and can be used to access the
internet, online systems and applications. People can use digital devices provided by their
employer, or even their own devices to connect to the internet and work from home.

The Internet is decentralised - it is not controlled by any one individual or organisation.


Benefits or working from home
To individuals:
➔​ No need to travel to work
◆​ Reduces stress caused by traffic, public transport delays and overcrowded
transport
◆​ Saves money
◆​ Helps the environment by reducing travel emissions
➔​ Spend more time working or resting -> spend less time travelling
➔​ No need to wear uniform or business clothes -> reduces cost
➔​ Work flexibly
➔​ Can work on tasks for longer periods of time without distractions from colleagues or
meetings
➔​ Work in comfy environment


➔​ Organise work around social & family commitments
Drawbacks to individuals:
➔​ May be distractions at home
➔​ Suffer from lack of interaction with colleagues
➔​ Feel disconnected from company

✅Benefits to organisations:
➔​ Attracts talented, motivated workers
➔​ Can employ people located anywhere in the world
➔​ Do not need to buy or rent office space or furniture for employees
➔​ Workers dont community, they will not delay work


➔​ Worker may work more effectively at home
Drawbacks to organisations:
➔​ Concerns about data security
➔​ Difficult to manage and support employees
➔​ Employees might not work as hard
➔​ Can be complicated on paycheck day for workers in dif. Countries

Impact of the internet on organisations

Positive impacts:

●​ Improved communication
Can communicate and interact with customers and employees more easily and in real-time
using email, messages, and social media. Provide up to date info about developments,
pricing and availability of their products and services. Eg. charities
Cecilia Jones Maganto
5
ICT iGCSE Revision
●​ Access to global markets
Easier to advertise and sell to customers in countries around the world. Producers of digital
content are now able to sell their products online without having to create physical packaging
and avoid postage charges. Ensure that manufacturers have easier access to businesses
that produce materials -> better communication

●​ Access to global workforce


Organisations can employ people in other countries. More selective when hiring, because
the distance from where they live to the organisation’s office doesn’t matter.Make use of
different skills and time zones.

●​ How information is managed and used


Can make use of big data to understand the behaviour of their customers, improve the
customer experience and make their processes more efficient.

Eg. Computer game retailers use data gathered from analysed media posts, web browser
patterns, ratings and sales to predict which game will sell best in future. Can then make sure
to buy stock of the game to meet demand, and not too much for less popular ones.

Eg. weather data from sensors, phones and aircraft- Processing allows org. To understand
how diff types of weather can affect their services.

Negative impacts

●​ Security issues
Data stored is private and valuable. Data physically stored by walls locks alarms and
security guards.
Employees often work from home, organisations use internet to provide their employees
access to their systems
-​ Employees transfer copies of org. Data to home via email
-​ Providing remote access to data stored in org’s building such as by VPN
-​ Storing data on another company’s servers and providing access to data

Each method means data is more vulnerable to being accessed by unauthorised users.

Three main ways unauthorised users can gain access to systems


-​ Authorised users reveal login details, such as by losing paper copy, saving login
details to the computer they lose, pressured into telling someone details, or having
easy passwords. Policies make employees accountable for actions.
-​ Intercept the data as it is transferred over internet from org to employee’s computer
within employees LAN after it had been by WAN-Use encryption to secure data when
it is transferred
-​ Hack into org. Systems, authentication, firewalls and intrusion detection systems.

Cecilia Jones Maganto


6
ICT iGCSE Revision
-​ Greater competition
Organisations must compete in a global marketplace, large orgs can also become less
attractive to customers because they may be less flexible than small online businesses.

The internet has provided new channels for the trade and distribution of goods and services.
Threatened by:
●​ Music, film and DVD retailers - online downloads and streaming
●​ Record labels - independent artists publish and distribute music online
●​ Estate agents - people advertise independently
●​ Postal services - ability to send message and media instantly

Impact of the internet on society

Causes of unequal access to ICT


Digital divide - difference between those with technology and those without

Can be affected by:


-​ Economy and infrastructure:
➔​ Advanced countries can invest and provide access to networks and internet
➔​ Emerging countries prioritise more basic needs such as food and healthcare.
-​ Location: people can’t access in remote locations such as forests or mountains.
-​ Politics: gov. wants to control access to info so they prevent or reduce access for
citizens.
-​ Religion: ban access to certain technology eg. Amish communities don’t use radio,
TV or Internet
-​ Disability: if they aren’t inclusive, people with find it more difficult and rely on
adaptations
-​ Social factors: age, gender, education and income affect ability to access

Impact of limited or no access to technology


If someone doesn’t have = less access to communication with others. More isolated and can
reduce understanding of different cultures.
Reduces availability of:
●​ Good and services (can’t find bargains and good deals)
●​ Entertainment (no pop culture)
●​ Education (reduce employment opportunities)

Impact of less restricted access to networks


1.​ Empowerment of social media:
eg. youtube allow individuals to share messages globally without relying on traditional
media, democratised communication but is still moderated by policies and algorithms
2.​ User generated content:
Eg. Wikipedia change trad notions of expertise by allowing any user to provide info which
might not be accurate
3.​ Positive opportunities:
Internet has created billionaires but helps volunteers and good causes
Cecilia Jones Maganto
7
ICT iGCSE Revision
4.​ Impact on law enforcement:
During events like the 2011 England riots, social media used by rioters to coordinate and
police to monitor actions and offenders.
5.​ Digital humanitarianism:
Ushahidi - to record and map incidents of attacks, promote social responsibility and aid
others like in Kenya with civil unrest. Since, has helped to track and report thousands of
human rights violations and earthquakes.

Gap between information rich and poor


Info rich: good access to info, improves level of education and ability to make decisions
Info poor: ⬆︎ all opposite
Existed before the internet, but it has widened because of amount of info online.
People who don’t have access, do have alternatives like SMS messages. But they don’t
provide as much information.

Impact of the internet on ways of socialising


The internet has transformed socializing by increasing virtual interactions, enabling global
connections, and reducing reliance on direct communication through tools like status
updates.
Can lead to social isolation from family and local communities and is criticised for making
friendships feel superficial, as even strangers can be labeled as "friends."

End of Chapter Questions


1.​ Which one of these activities is only possible when using the internet?
C

2.​ State two benefits to employees of working from home.


Employees can manage their work schedules more efficiently, balancing personal and
professional responsibilities and cost saving on commuting, meals, and work attire.

3.​ State two drawbacks to organisations of employees working from home.


Reduced collaboration on work, difficult to maintain in communication and monitoring
difficulties because it is harder to oversee employee productivity and performance.

4.​ Explain one reason why the use of the internet may affect the ability of
individuals to interact with other people face-to-face.
People often spend significant time online, engaging in virtual communication through social
media, messaging, or gaming. Leads to fewer opportunities or less motivation to connect in
person, potentially diminishing social skills and personal connections.

5.​ Explain one reason why cyberbullying can be more distressing than in-person
bullying.
Cyberbullying can be more distressing because it can happen anytime and anywhere,
making it difficult for victims to escape, even in the safety of their own homes.

Cecilia Jones Maganto


8
ICT iGCSE Revision
6.​ State what is meant by the term 'collaborative working'.
Collaborative working refers to individuals or groups working together, often using shared
tools or platforms, to achieve a common goal or complete a task efficiently.

7.​ State three factors that affect unequal access to ICT.


Limited financial resources; where you live; education level of ICT

8.​ State three examples of services that are not available to those with limited or
no access to digital technologies.
VLEs, digital banking, government services.

9.​ Describe two ways in which greater access to networks has affected society.
Improved communication allows people to connect instantly, access to networks has created
new jobs

10.​Describe the effect of the internet on the information gap.


Narrowed - provides vast amounts of information to anyone with access, Widened - people
who don’t have access to the internet are unable to benefit from the resources and
opportunities it offers, leaving them further behind

11.​Discuss the impact of the internet on how individuals socialise.


Positive impact: social media platforms, video calls, and messaging apps make staying in
touch easier and more convenient, internet enables people to connect with others worldwide,
new communities can be formed helping them connect with like-minded people and reducing
feelings of loneliness.
Negative impact: reduced face-to-face interactions because we are over relying on online
communication can lead to fewer in-person interactions, ruining our social skills, people are
anonymous and more likely to have harmful behaviours that can negatively affect other’s
mental health.

12.​Describe two ways in which individuals can stay safe online.


By using strong passwords and being cautious with personal information.

13.​Explain why organisations use the internet increases the risk to data security.
Increased exposure to cyberattacks, hacking, phishing to compromise private data and its
wider access points increase the chance of a data leak.

Cecilia Jones Maganto


9
ICT iGCSE Revision

Unit 3: Operating Online

Chapter 8: Online Communities


Each type of online community has:
-​ Function: what it does for users
-​ Features: enable it to do function
Different online communities provide different features that their members can use to interact
with others. Features for one can now be used for other types of communities.

Social Networking Communities


Networking = forming groups in society. Eg. Facebook, Instagram, Twitter.
Function:
Allow members to connect through shared interests or relationships.
Can be professional such as LinkedIn or personal.
They started out with separate functions but converged and started to mix together.

Features :

-​ Profiles
Add information about yourself, some services allow users to decide info that can be shared.
Includes biographical details, a bio, images, contact info…

-​ Friend, follow and connect


Allow users to add someone to their social network.

-​ Stream, wall and timeline


Stream: where posts from members’ friends appear, info brought straight to the user instead
of looking for it.

-​ Status updates and posts


Members of a community can either send a message to other members in their network or
send it publicly to all members of the community.
Post - to put a message or computer document on the internet so that other people can see
⬇︎Owners can sell info from their database about users to advertisers for
Targeted marketing
Advertising matched to internet users based on their attributes, such as their age group or
gender, or browser history
Members pay fee to promote their posts often used by organisations for marketing also
known as ‘sponsored posts’

-​ Group lists and circles


Allow members to create named groups, lists or circles of members.

1
ICT iGCSE Revision
-​ Tags
Allows members to categorise content they create and post on network communities

-​ User suggestions
Suggest other members that users might want to connect with, by analysing interests and
mutuals

-​ Reactions and likes


Features to show their reactions to posts by other people and recommend the posts to other
members of their community

-​ Share
Allows members of the community to repeat other member’s posts to the community, making
it more available to others. Going viral = something circulated widely by being shared
through networks to large numbers of users.

-​ Comments and quotes


Functionality allows members to have online conversations and communicate with each
other by writing on each other's posts.

-​ Third-party integration
Include direct links to sites so that people can share the info provided on third-party
websites.

Additional Features

-​ Add content to posts


Such as photos, videos, and URLs so they can share their experience in different ways
letting them preview before posting.

-​ Private or DMs
Allow members message each other instead of doing it publicly

-​ Notifications
Alert that tells a user about a new interaction or new content within a community.

-​ Analytics
Helps individuals and organisations identify their most effective communications to increase
size of network and gain followers

Online Gaming Communities


Eg. PlayStation, Xbox and MMORPGs.
Function:
To allow members of communities to play multiplayer games together
Features:

2
ICT iGCSE Revision
-​ Links to social media
-​ User profiles
-​ Experience points
-​ Statuses and notifications

Online Work Spaces


Eg. Adobe, Slack, Microsoft Teams
Function: members of the community can collaborate together for the purposes of work.
Features:
-​ Cloud storage and web apps
-​ Editing options
-​ Messaging systems / chat rooms
-​ Shared calendars and contacts

VLEs (Virtual Learning Environments)


Eg. Classroom, Pearson
Function: allow students and teachers to use learning resources
Features:
●​ Stream containing posts and announcements by teachers and students
●​ Share option for files
●​ Gradebooks
●​ Communication tools
●​ Log-in systems

User-Generated ref. sites


= information website created and maintained by communities of members
Wiki = website/database that is developed by a n. Of collaborating users who can add and
edit content.

Features of wikis
-​ Member accounts to track edits
-​ Structure language
-​ Search tools

Forums
Function: website where users can post comments and info replying to other comments.
Provide online spaces for structured discussions = threads
Features:
-​ Groups + moderators + administrators
-​ Posts + threads

Safety measures:
●​ Word or URL censoring
●​ Report and block buttons
●​ Policies

3
ICT iGCSE Revision
User Generated Content
Content available online made by users of particular site/service

Video sharing and photo sharing


Eg. Youtube, Vimeo
Function: allow users to access + share content created/uploaded by members of the
community.
Features:
●​ User accounts + profiles
●​ Content management system
●​ Tags + rating + comment
●​ 3rd party integration

Blog and vlogs


Blog = website updated regularly, like a diary or series of articles
Vlog = video blog
Function:
Allow people to create online diaries of events or articles
Features:
●​ User accounts and profiles
●​ Text editors, which allow bloggers to write and edit their content online
●​ Upload tools
●​ Tags + ratings + comments
●​ 3rd-party integration such as social networking features, which allows users to share
and react to the blog or vlog.

Social bookmarking sites


Social bookmarking sites allow users to categorise and share web documents and URLs so
that other people can access them. Examples include Pinterest and reddit
Function:
Allow people to share web documents and URLs with each other.
Features:
-​ Connects users with each other
-​ 3rd-party integration to react and share content
-​ Tags to categorise URLs
-​ User accounts

Online communities for communication and


collaboration on global scale
Due to global reach,online communities are accessed by members from all over the world
-> translation tools provide wider access to content and services

4
ICT iGCSE Revision
How to stay safe online

Anonymity of others and misrepresentation


Anonymous - when other people do not know who you are or what your name is

Protects users but they can misrepresent themselves by pretending to be someone they
aren’t

Disclosure of personal info or location


Can be dangerous to disclose too much info online
Could be used for grooming or locating a person.
Can happen by geotagging photographs to photo-sharing sites:
-​ Info provided by GPS data
-​ Calculated from users Wi-Fi or ISP data
To reduce risk:
●​ Not post publicly about their location
●​ Check privacy settings often
●​ Report anyone who may be misrepresenting themselves

Cyberbullying
Use of internet to send texts or images in order to upset or embarrass someone

End of Chapter Questions:


1.​ Which one of these is used to set the rules for an online community? (1)
A User ratings
B Analytics


C Features that allow commenting and sharing
D Acceptable use policies

2.​ Describe the use of tags in online communities. (2)


Used to categorise information so its located easier

3.​ Describe how social networking services benefit from members sharing
content.(4)
Sharing increases reach of content and encourages users to be more active users of
service. Provide the service with more info which the services then use to sell marketing
opportunities to advertisers.

4.​ Explain why some online communities have administrators and moderators. (3)
Different levels of user responsibility can be set so people are responsible for quality
checking members and posts to ensure policies are followed, block posts and ban members
from community.

5
ICT iGCSE Revision
5.​ State three ways in which a user can personalise their online profile. (3)
Name, gender, date of birth, ‘about’ section.

6.​ State the function of social bookmarking (1)


To allow users to share URLs
7.​ Explain why online work spaces could benefit a large international
organisation. (3)
Because if orgs workers are remote it could make communicating and collaborating on work
more difficult or expensive to organise and time consuming due to time times and costs and
time of travel. Benefit from having centralised resources eg. shared calendars and docs.

8.​ Describe how social networking sites are able to make suggestions to
members about people that they may want to connect with. (2)
Matching info shared by members
9.​ Describe how some social networking sites are able to decide which
advertisements to show to different members. (2)
Matching info shared by members

10.​State four ways in which students can use the features of VLEs to support their
learning. (4)
-​ Students access resources
-​ Students interact with teachers
-​ Students can collaborate on assignments with others
-​ Students get immediate feedback from quizzes

11.​State three examples of interactions that social network users can have with a
member's post. (3)
-​ Like
-​ Repost
-​ Comment

12.​Discuss the factors that users of social networking sites should consider when
sharing personal information. (8)
When using social networking sites, users must consider several important factors before
sharing personal information online. One key consideration is personal safety. Sharing
details like your location, phone number, school, or daily routine can put you at risk of being
contacted by strangers or even becoming a target for criminal activity such as stalking or
identity theft. Therefore, it’s important to only share information with trusted people and to
use privacy settings to control who can see your content.

Another important factor is the cost to users’ privacy. When people post personal information
online, they often lose control over how that information is used. Even if the post is later
deleted, others may have already saved or shared it. This can affect users in the future, for
example, when applying for jobs or college placements, as employers may look at online
profiles during the recruitment process.

In addition, companies may share users’ personal information with third parties. Social
media platforms often collect data from users, including their interests, search history, and

6
ICT iGCSE Revision
location. This data can be sold to advertisers or used for other purposes, often without the
user fully realising it. While this is sometimes allowed by the platform’s terms and conditions,
it still raises concerns about how much control users really have over their data.

Finally, users should be aware of targeted marketing. This is where companies use the
information gathered from social media to advertise products and services specifically to
individuals. While this might seem useful, it can also feel invasive and manipulative, as it can
lead users to spend more money or be influenced in their decision-making without fully
realising it.

In conclusion, while social networking sites can be fun and useful, users must be cautious
about what they share. Considering personal safety, privacy, and how companies use their
data can help protect them from potential risks online.

7
ICT iGCSE Revision

Unit 4: Online Goods and Services

Chapter 11: Online Services


Types of Service

Shopping sites
When user shops online they use a product catalogue grouped into subcategories
Features:
-​ Image of product
-​ Description + Price
-​ Ratings / Popularity
-​ Product code
-​ N. of stock
When customer likes product, they add it to an online basket: keeps record of items so they
don’t have to pay separately
1.​ When ready to pay, directed to checkout where they insert delivery details and pay
with voucher codes
2.​ If customer doesn’t have account, they could shop as a guest or be asked to create
one. If guest you can’t follow progress of order or receive offers
3.​ Shopping sites offer secure payment systems to protect customers’ payment info
when transmitted online

_________________________________________________________________________

Booking systems
Train + airline + bus tickets + leisure tickets can be purchased online. Customers choose
travel time, n. of tickets and type of tickets they want.
Can also be added to a basket.

When buying tickets using online booking system


-> tickets sent via email (so you have to register)
-> can be e-tickets linked to details
-> use QR codes

_________________________________________________________________________

Banks
Online services they offer:
●​ Checking balances
●​ Balance alerts
●​ Making payments + transfers
●​ Applying for loans + financial products

1
ICT iGCSE Revision
●​ Managing alerts and notifs of payments and balance amounts
●​ Accessing customer service
●​ Changing personal info

_________________________________________________________________________

Education and training providers


Allow learners to access:
●​ Online journals and reference archives
●​ Online support from teacher + peers
●​ Learning and assessment materials
Access provided from VLEs (Virtual learning environments)

_________________________________________________________________________

Gaming sites
Online applications that allows users to play games that are hosted on a remote server.
Can be multiplayer and control dif characters in real time.

_________________________________________________________________________

News and info providers


Give up-to-date access to stories using blogs and notifications sent to subscribers
Provides real-time notifs about weather, sports, stock markets and currency values

_________________________________________________________________________

Auction sites
Allows sellers to list items for sale for a certain period of time and allows buyers to offer
money for these items
Buyer offered most money completes the checkout process.
Provide ratings for buyers, if high = reliable and pay on time but seller chooses which buyer

If buyer bids but someone else offers more money, they will alert buyers so they don’t miss
chance

_________________________________________________________________________

2
ICT iGCSE Revision
The impact on lifestyle and behaviour

Benefit Drawbacks

More time can be spent with family/friends More time spent using online services

Safer lifestyles as no need to carry cash, Can be inconvenienced if no connectivity


could put individuals at risk available

Ppl more engaged with creative media Ppl may be less active because they
(art,videos,drama,photography) access services without having to move

The impact on the ways organisations do business


The Internet has provided new ways for people to work online such as working from home.
Changes include:
-​ Improved communication
-​ Access to global markets
-​ Access to global workforce
-​ Use of big data to understand customer behaviour
-​ How organisations secure business info
-​ Increased competition

Transactional data
= data that is sent between digital devices

Online transaction occurs whenever data is sent between devices on the internet

Data stored as ‘cookies’ that can be encrypted can be tracked online by network
Cookies = info that a website leaves on a user’s computer so the website recognises them
Data stored as cookies:
-​ Time + date of transaction
-​ IP addresses
-​ Referring website
-​ Products + services viewed/bought
-​ Data entered in forms

Different types of cookies

➔​Session cookies
Only stored until a web page is closed in browser

➔​Persistent cookies
Used to record info about the user’s use of the internet overtime, can keep a user logged
into online account so they don’t have to log in every visit

3
ICT iGCSE Revision
Allow advertises to track users’ use of the internet

➔​Third-party cookies
Can be used to personalise users’ online experience and target adverts

Targeted marketing = advertising that is matched to people based on browser history and
attributes because of ad servers

Ad server can request the cookies each time the banner loads and gets tracked, then server
can select advertisements to display banner.

End of Chapter Questions

✅ Paying in cheques
1.​ Which one of these is not provided by banks as an online service

Transferring money
Viewing account balance
Applying for a loan

2.​ State two ways in which education providers can use online services to help
learners
-VLEs
-Online support

3.​ State three features of shopping sites


-Basket
-Product catalogue
-Checkout

4.​ Explain why auction sites provide ratings for buyers


Helps sellers know which buyers are more reliable and can trust to pay for items

5.​ Explain why banks use HTTPS for their online services
Uses encryption to stop their customers data from being read by unauthorised users

6.​ Explain the benefit of e-ticketing for airline flights


No need to check in at a check-in desk at the airport making the process more efficient
saving passengers time

7.​ State one drawback of the use of third-party cookies


Their use affects users’ privacy

8.​ State three examples of data that can be stored in cookies


-Time and date of transaction
-IP addresses
-Buttons pressed

4
ICT iGCSE Revision
9.​ State the difference between session cookies and persistent cookies
Session cookies are only stored while the browser has the site open or until the browser
closes the site. Persistent cookies are stored after the browser closes the site

10.​State the way in which news services can use a feature of smartphone apps to
keep users up to date
Use of notifications or alerts

11.​Discuss how the use of cookies by organisations impacts on individuals (8


marks)
Organisations use cookies to track the transactions that individuals carry out online, such as
the websites that they visit. This browsing history can then be used by organisations to
target their marketing and create a personalised experience for users. Although some
people find this useful, other people do not like the fact that their online activity is tracked
and monitored; as they believe this to be intrusive and to have a negative effect on their
privacy. They do not like the ways in which these systems are used to decide the content
people are shown and say that they would prefer to decide this themselves as it may limit or
narrow their experience.

5
ICT iGCSE Revision

Unit 4: Online Goods and Services

Chapter 12: The Cloud


The cloud is the term to describe the internet when it is used to provide software or space for
storing information.

Local hardware
When you use software stored on your hard drive for files
-> provides best performance because no network connectivity slowing transfer of data

When you use the cloud you use the internet to access apps stored on severs.

Hosted Applications Software


Web apps are stored on online servers and user interface for the application displayed in a
web browser. Web apps = hosted applications
Features:
●​ Software is hosted on a server
●​ Uses online data storage
●​ Uses client-server model
○​ Users can collaborate on applications/files
Drawbacks:
●​ Only available with internet connection
●​ Can be affected by latency + bandwidth (hosted don’t offer as many features)
○​ poor user experience
○​ Application loading times

Advantages Disadvantages

Accessible from many types of connected Only accessible with Internet connection
device

Uses online data storage - save files online User experience affected by high latency or
low bandwidth

Features that enable collaboration Not as many features as locally installed


software

Cecilia Jones Maganto


1
ICT iGCSE Revision

Online Data Storage


Can be accessed from anywhere from any device with an internet connection

Advantages Disadvantages

Files backup automatically Data protection issues if server far away

Storage scalable Dependent on online storage provider for


security

Data sharing + collaboration easier File transfer much slower

Offer unlimited storage packages Only accessible with internet

More local storage available Some files can’t be opened w/o download

Have to pay for additional storage

Impact of the Cloud


Cloud-based services include hosted applications and online data storage.

Locally installed software developers have big competition, in response they:


-​ Add more features
-​ Provide their own cloud-based apps
-​ Online data storage link with locally installed software
-​ Sell netbooks

Netbooks
●​ Inexpensive
●​ Don’t need alot of storage because they access hosted applications and online data
storage
●​ More people have access to technology = helped reduce the digital divide

Cloud-based services
Help organisations providing scalable solutions to needs. Save on the cost of buying,
housing and maintaining their own servers.
Provide individuals variety of online services like:
-​ Shopping sites
-​ Booking systems
-​ Banking

Cecilia Jones Maganto


2
ICT iGCSE Revision
-​ VLEs and MOOCs
-​ Gaming
-​ News
-​ Entertainment services

Can provide access to online communities like social networking sites, online work spaces
and user-generated content.

End of Chapter Questions


1.​ Which one of these is used to store hosted applications?
Laptop


Smartwatch
Server
Tablet
2.​ State three benefits of using online data storage.
-​ Accessible from many types of connected device
-​ Uses online data storage - save files online
-​ Features that enable collaboration
3.​ State three online services provided by cloud-based services
-​ Shopping sites
-​ Booking systems
-​ Banking
4.​ State what is meant by the term ‘cloud’.
The term cloud is used to describe the internet when it is used to provide software or space
for storing information.

Cecilia Jones Maganto


3

You might also like