0% found this document useful (0 votes)
89 views117 pages

FORM 5 Notes

Igcse ICT

Uploaded by

bwanalicarl23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views117 pages

FORM 5 Notes

Igcse ICT

Uploaded by

bwanalicarl23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 117

F5 2023 Revision guide notes for paper 1 Additional Revision notes

File Compression
Hardware

 Hardware refers to the physical components of a computer system


 These components can be internal or external

Internal Components

 Central Processing Unit (CPU): the computer's "brain" that performs calculations, processes
instructions, and controls other components
 Processor: a chip inside the CPU that carries out instructions from a program
 Motherboard: the main circuit board that connects all internal components

Internal Memory

 Random Access Memory (RAM): temporary storage for running programs and data; it is
volatile, meaning data is lost when the computer is turned off
 Read-Only Memory (ROM): permanent storage for essential data, like the computer's BIOS;
it is non-volatile, meaning data is retained even when the computer is turned off

Hardware Components

 Graphics card: processes images and videos for display on a monitor


 Sound card: processes audio for output through speakers or headphones
 Network Interface Card (NIC): enables connection to a network, such as the internet
 Camera: captures images or video for input into the computer
 Internal/external storage devices: stores data permanently, such as hard drives or USB flash
drives
 Input devices: allow users to enter data, like keyboards and mice
 Output devices: display or produce results, like monitors and printers

Worked example

A computer contains internal hardware. Write down the most appropriate item of internal
hardware to match the descriptions.

a. This handles all the system instructions

[1]

Processor / CPU [1]

b. A printed circuit board that contains the main components of the computer

[1]

Motherboard [1]

1
c. This generates output for the speaker

[1]

Sound card [1]

d. A type of memory where data is lost when the computer is switched off

Central Processing Unit (CPU)


Download PDF
Central Processing Unit (CPU)

 The Central Processing Unit (CPU) is the computer's "brain" responsible for
processing instructions entered into the computer
 The CPU processes instructions and performs calculations in order to produce an
output

CPU Functions

 Fetches instructions from memory


 Decodes the instructions to determine the required operation
 Executes the operation
 Stores the result back in memory or sends it to an output device

CPU Components

 The CPU is made up of 3 main components:


o Arithmetic Logic Unit (ALU)
o Control Unit (CU)
o Registers

Software
Download PDF
Software
 Software refers to programs that control the operation of a computer or the processing
of electronic data

Application Software

 Application software provides the services that users require to solve a task
 E.g.:
o Word processing: creating and editing text documents
o Spreadsheet: organising and analysing data in a grid format

2
o Database management systems: storing, retrieving and managing data in
databases
o Control/measurement: uses sensors to measure and control a system
o Applets and apps: specialised software for specific tasks
o Video editing: creating and modifying video files
o Graphics editing: creating and modifying images
o Audio editing: creating and modifying sound files
o Computer Aided Design (CAD): designing and modelling objects in 2D or
3D

System Software

 System software provides the services that the computer requires to operate e.g.
o Compilers: translating high-level programming languages into machine code
o Linkers: combining object files into a single executable program
o Device drivers: controlling hardware components and peripherals
o Operating systems: managing the computer's resources and providing a user
interface
o Utilities: tools for maintaining and optimising the computer's performance

Worked example

Tick whether the following are examples of applications software or system software

[2]

Applications software Systems software

Control software
Compiler
Word processor
Device driver
Applications System
Software Software
(✓) (✓)
Control software ✓
Compiler ✓
Word processing ✓
Device drivers ✓
2 marks for 4 correct ticks
1 mark for 2 or 3 correct ticks
0 marks for 0 or 1 tick
Exam Tip
3
 A common misconception is that control software is system software - it's actually
application software

Operating Systems
An Operating System has a user interface to allow the user to interact with the computer.
There are different types of user interfaces:

 Command Line Interface (CLI)


o Text-based interface
o Users type commands to perform tasks
o Requires knowledge of command syntax
 Graphical User Interface (GUI)
o Visual-based interface with icons, windows, and menus
o Users interact with the system using a mouse and keyboard
o Easier for beginners to learn and use
 Dialogue-based interface
o Users communicate with the system through text or voice
o The system responds with appropriate actions or feedback
 Gesture-based interface
o Users interact with the system through physical gestures
o Requires a camera or sensor to detect movements

Differences between types of interface

 CLI has a steeper learning curve compared to GUI


 GUI is more resource-intensive than CLI
 Dialogue-based and gesture-based interfaces enable more natural and intuitive
interaction

Advantages & Disadvantages

Type of Operating
Advantages Disadvantages
System

 Faster for experienced


 Difficult for beginners to
users
Command Line learn
 Consumes fewer system
Interface  Less visually appealing
resources

Graphical User  User-friendly and easier to  Slower for some tasks

4
compared to CLI
learn  Consumes more system
 Visually appealing resources (RAM / HDD)
 Better help facilities  Slower to run as graphics
Interface
 Can exchange data between have to be loaded
different applications  Restrictive as can only use
pre-defined functions

 Natural and intuitive  May require additional


Dialogue-based & interaction hardware
Gesture-based  Accessible for users with  Limited functionality
Interfaces disabilities compared to CLI and GUI

Exam Tip

 Make sure you explain your answer in full - GUI requires more power is not enough
on its own and needs expansion
 Make sure you know a range of both benefits and drawbacks

Analogue & Digital Data


Download PDF
Analogue & Digital Data
 Analogue data is continuous and varies smoothly over time
 Digital data is discrete and represented in binary form (0s and 1s)

Differences between Analogue & Digital Data

 Analogue data can have any value within a range, while digital data has a
limited set of values
 Digital data is less prone to noise and distortion compared to analogue data
 Digital data can be easily manipulated, stored, and transmitted by computers

Converting Analogue to Digital Data

 Analogue data must be converted to digital data so it can be processed by a


computer
 This process is called analogue-to-digital conversion (ADC) and is
performed by an analogue-to-digital converter

Converting Digital to Analogue Data

5
 Digital data must be converted to analogue data so it can be used to control
devices
 This process is called digital-to-analogue conversion (DAC) and is
performed by a digital-to-analogue converter

Worked example

Q. A greenhouse is used to grow plants and is computer controlled.


Give two reasons why data from the sensors need to be converted for use by a
computer.

[2]

Two of:

So that the data from the sensor can be understood by the computer [1]

The output from a sensor is analogue [1]

The input to the computer is digital [1]

Central Processing Unit (CPU)


Download PDF
Central Processing Unit (CPU)
 The Central Processing Unit (CPU) is the computer's "brain" responsible for
processing instructions entered into the computer
 The CPU processes instructions and performs calculations in order to produce
an output

CPU Functions

 Fetches instructions from memory


 Decodes the instructions to determine the required operation
 Executes the operation
 Stores the result back in memory or sends it to an output device

CPU Components

 The CPU is made up of 3 main components:


o Arithmetic Logic Unit (ALU)
o Control Unit (CU)
o Registers

6
Memory
Memory
Memory is used to store data and instructions temporarily for the computer to
process

Characteristics of ROM and RAM

ROM RAM

Non-volatile (retains data when Volatile (loses data when powered


Volatility
powered off) off)

Access Read-only (data cannot be modified) Read-write (data can be modified)

Stores data and instructions in use by


Main Purpose Stores essential instructions (e.g. BIOS)
CPU

Differences between ROM and RAM

 ROM is non-volatile, while RAM is volatile


 ROM is read-only, while RAM is read-write
 ROM stores essential instructions, while RAM stores data and instructions
currently in use

Q. Worked example
State two characteristics of RAM
[2]
Two of:
RAM can be read from and written to [1]
RAM is volatile memory [1]
RAM is temporary storage [1]
Exam Tip
Make sure you know the difference between RAM & ROM - it's easy to get them mixed up

Input Devices & Direct Data


Entry
7
Download PDF
Input Devices
Characteristics of Input Devices

 Input devices: allow users to enter data or instructions into a computer


system e.g.:
o Keyboard
o Mouse
o Scanner
o Microphone
o Touch screen

Differences between Input & Output Devices

 Input devices send data or instructions to the computer, while output devices
receive data from the computer
 Input devices are used for user interaction and data entry, while output
devices display or produce the results of data processing

Input Device Use Advantages Disadvantages

Fast and accurate The steeper learning


Keyboard &
Entering text and numbers input for experienced curve, repetitive strain
Numeric Keypad
users injury
Navigate and interact with Intuitive and precise Requires flat surface,
Pointing Devices
computer interfaces control the strain on the wrist
Control devices from a Convenient, no
Limited range, may
Remote Control distance, e.g., TVs and direct physical
require line-of-sight
media players contact is needed
Enhances gameplay Expensive, limited use
Joystick/Driving Simulation and driving
experience, realistic outside of gaming,
Wheel games
control bulky
Direct interaction with the Intuitive, no need for The screen may get
Touch Screen screen using fingers or a a separate pointing dirty, less precise than
stylus device a mouse
Accurate Quality depends on
Scanners and Capture images and convert
reproduction, easy to resolution, which can
Cameras them into digital format
share and store be expensive
Capture a sound for Hands-free input can May pick up
Microphone recording or be used for voice background noise, the
communication purposes recognition quality varies

8
Sensors detect changes in Can automate tasks, May require
Sensors and Light
the environment; light pen provides real-time calibration, affected by
Pen
interacts with screens information the environment
Exam Tip

 Note that a mouse isn't built into a laptop - instead, it would be another
pointing device e.g. trackpad
 All the devices listed here are input devices. Some people think microphones
and webcams are output devices

Direct Data Entry

Direct Data
Use Advantages Disadvantages
Entry Device

Reading information stored Data can be easily erased,


Magnetic Stripe Fast, simple to use,
on magnetic stripes, e.g., and limited storage
Reader reliable
credit cards, ID cards capacity

Chip and PIN Processing debit and credit Secure, quick transaction, Requires PIN input,
Reader card transactions in stores reduced fraud risk potential for skimming

Reading information from No line-of-sight is


The expensive system, and
RFID Reader RFID tags, e.g., inventory needed, multiple tags are
potential privacy concerns
tracking, access control read simultaneously

OMR (Optical Reading marked areas on


Fast processing, reduced Limited to specific forms,
Mark forms, e.g., multiple-choice
human error cannot read handwriting
Recognition) exams

OCR (Optical Converting printed text into


The fast and accurate, Can struggle with complex
Character digital text, e.g., digitising
searchable digital text layouts, font dependent
Recognition) books

Scanning barcodes to retrieve


Fast and accurate, low Requires line-of-sight,
Barcode Reader product information and
cost limited data storage
prices
Scanning QR codes for Requires a smartphone or
Can store more data,
QR Scanner information retrieval or specific scanner, quality
versatile uses
linking to websites dependent
Worked example

9
Q. For each of the following uses of data capture, name one appropriate direct
data entry device. The devices must be different in each case

a. Contactless credit cards

[1]

Radio Frequency Identification/RFID reader [1]

b. Multiple choice answers in an examination paper

[1]

Optical Mark Reader/OMR [1]

c. To scan items at a computerised till

[1]

Bar Code reader/scanner [1]

Output Devices
Download PDF
Output Devices
Characteristics of Output Devices

 Output devices: display or produce the results of data processing from a


computer system e.g.:
o Monitor
o Printer
o Speakers
o Projector

Differences between Input & Output Devices

 Input devices send data or instructions to the computer, while output devices
receive data from the computer
 Input devices are used for user interaction and data entry, while output
devices display or produce the results of data processing

Output Use Advantages Disadvantages


Device

10
Displaying computer-generated Real-time display, Power consumption,
Monitor
visual information on a screen adjustable settings potential glare
Touch Displaying visual information and Susceptible to smudges,
Screen allowing user interaction with the Intuitive, space-saving potential calibration
(Output) screen issues
Projecting computer-generated
Multimedia Large display, good for Requires darkened room,
images and videos onto a larger
Projector presentations expensive bulbs
surface
Printing high-quality text and Fast, high-quality prints, Expensive initial cost,
Laser Printer
graphics quickly lower cost per page limited to flat surfaces
Inkjet Printing text and graphics using Lower initial cost, high- Slower, higher cost per
Printer liquid ink quality prints page, ink may smudge
Printing text and simple graphics
Dot Matrix Low cost, can print
using a print head that strikes an ink- Noisy, low print quality
Printer multi-part forms
soaked ribbon
Creating large-format graphics, such
High accuracy, can print Slow, expensive, large
Plotter as architectural plans and
on various materials size
engineering designs
Creating three-dimensional objects Customisable designs, Limited materials, slow
3D Printer
by adding material layer by layer rapid prototyping process
Range of sizes and
Converting digital audio signals into Can be power-hungry,
Speaker power outputs,
sound the sound quality varies
immersive audio
Converting electrical signals into
Precise movement, Requires power, potential
Actuator physical movement, e.g., motors and
programmable mechanical wear
valves in robotics

Holographic imaging

 Holographic imaging is a technique that creates three-dimensional images


by recording and reconstructing light waves
 These images provide a realistic and immersive visual experience
 This could be used in medicine to create:
o MRI scan images

o Ultrasound images
o 3D views of our internal organs

Worked example

Complete the following sentences using the most appropriate items from the list
below.

11
A 3D printer An ADC A compiler An interpreter A microphone
A monitor A numeric keypad A speaker A switch A USB
a. ________ is a device used to input a pin

[1]

A numeric keypad [1]

b. ________ analyses and executes a program line by line

[1]

An interpreter [1]

c. ________ produces output in the form of solid objects

[1]

A 3D printer [1]

d. ________ produces output in the form of sound

[1]

A speaker [1]
Exam Tip

 Make sure you know which printer is which. Some people get mixed up
between dot matrix and laser
 Detail is needed in the description in order to achieve full marks. Relating the
answer back to the scenario is important as some printers would not work in
the given scenario.

Storage
Storage
Characteristics of Backing Storage

 Backing storage: long-term storage used to store data, files, and programs when not
in use e.g.:
o hard disk drives (HDD)
o solid-state drives (SSD)
o USB flash drives
o optical discs (CDs, DVDs)

12
 Backing storage is typically slower than internal memory but has a larger capacity
 It is non-volatile, meaning it retains data when the computer is powered off

Differences between Backing Storage & Internal Memory

Backing Storage Internal Memory

Long-term storage of files, Temporary storage of data and essential instructions


Function
programs, and data while the computer is running

HDD, SSD, USB flash drives,


Examples RAM, ROM
optical discs (CDs, DVDs)

Access
Slower Faster
Speed

Capacity Larger Smaller


Non-volatile (retains data when
Volatility RAM: volatile, ROM: non-volatile
powered off)

Storage Media

Storage
Examples Use Advantages Disadvantages
Media

Hard disks, Slower access time,


Magnetic Long-term data storage, High capacity,
moving parts, susceptible
Drives backup, and archiving low cost per GB
Magnetic tape to magnets
Data storage, audio,
Optical CD, DVD, Blu- Portable, durable, Limited capacity,
video, and software
Discs ray low cost susceptible to scratches
distribution
Memory cards
(SD, xD,
Fast data storage for
Solid-State Fast access time, More expensive, limited
portable devices and
Media CFast), USB no moving parts write cycles
modern computers
Drives, Solid
State Drives

13
Worked example

Q. Give two error messages that may appear when trying to save to a CFast solid-state
memory card.

[2]

Two of:

Medium is full [1]

Corrupt card [1]

Write error [1]

Card error [1]

Card not initialised [1]

Virus found on the card [1]

Device not recognised [1]

Storage Devices

Storage
Use Media Advantages Disadvantages
Devices

High capacity Slower access time,


Magnetic Long-term data storage,
Magnetic (10TB), low cost moving parts, susceptible
Drive backup, and archiving
per GB to magnets
Fixed Large storage
General-purpose storage in Magnetic Moving parts, vulnerable
Magnetic capacity (5TB),
computers and servers Hard Disk to physical damage
Hard Drive relatively fast

Portable Portable (5TB), Slower than SSDs,


External storage for data Magnetic
Magnetic large storage vulnerable to physical
transfer and backup Hard Disk
Hard Drive capacity damage

14
Backup and archiving, High storage
Magnetic Magnetic Slow access time,
especially for large capacity (10TB),
Tape Drives Tape sequential access
volumes of data low cost
Audio and data storage, Affordable, widely Low capacity (700MB),
CD CD
software distribution compatible susceptible to scratches
Higher capacity storage for Higher capacity Susceptible to scratches,
DVD data, video, and software DVD than CD (8.5GB), lower capacity than Blu-
distribution affordable ray
High capacity
High-definition video and (50GB), high- More expensive, and
Blu-ray Blu-ray
high capacity data storage resolution video requires specific hardware
storage
Fixed Solid- Fast access time, no
Fast internal storage for More expensive, limited
State Drive Solid-State moving parts, high
modern computers write cycles
(SSD) capacity (30TB)
Fast access time,
External storage for fast portable, no moving More expensive, limited
Portable SSD Solid-State
data transfer and backup parts, high capacity write cycles
(2TB)
Small size, fast Limited capacity
Portable data storage and
Pen Drive Solid-State read/write speeds, compared to other storage
transfer for various devices
high capacity (1TB) devices
Worked example

Q. A program collects a large amount of data and this could be stored using either a
fixed solid-state drive (SSD) or cloud storage.

a. Describe four advantages to the school of using cloud storage rather than using the
SSD

[4]

Four of:

The cloud has greater storage capacity [1]

The data could be sent directly to/from the cloud from any computer/device [1]

Storage capacity can be increased without adding additional physical devices [1]

Many people can share the data [1]

The school would only pay for the storage used [1]

15
There is an automatic backup of data [1]

b. Describe three disadvantages to the school of using cloud storage rather than using the
SSD

[3]

Three of:

More security issues as multiple copies of the data are stored [1]

The school loses control over the storage of the data [1]

Cloud storage has an ongoing cost [1]

Users must have a reliable internet connection to store data [1]

Users must have an internet connection to access data [1]

TYPES OF COMPUTERS
Desktop Compuers
a)Desktop Computers
Characteristics of a Desktop Computer

 Designed to be used on a desk or table


 Comprised of separate components (monitor, keyboard, mouse, tower)
 More powerful than laptops and tablets
 Easier to upgrade and customise
 Typically less portable than other computer types

Uses of a Desktop Computer

 Office and business management:


o Word processing
o Spreadsheet creation and management
o Email communication
o Data storage and backup

16
 Education:
o Access to educational resources
o Creating and editing multimedia content
o Conducting research
o Distance learning and virtual classrooms
 Gaming and entertainment:
o High-performance gaming
o Streaming movies and TV shows
o Social media browsing
o Creating and editing video and audio content

b)Mobile Computers

Portable computing devices, such as laptops, smartphones, tablets, and phablets, that allow
users to access and use computer applications and resources on the go

Characteristics of Mobile Computers

 Laptop Computers:
o Portable with integrated display, keyboard, and touchpad
o Battery powered
o Less powerful and less expandable than desktops
 Smartphones:
o Portable and lightweight
o Touchscreen interface
o Multifunctional (phone, internet access, camera)
o Anti-glare screen
o Front and rear facing camera
o Battery powered
o Uses Bluetooth, WiFi, 3G, 4G, 5G
o Has an on screen keyboard
 Tablet Computers:
o Larger touchscreen than smartphones
o Ideal for media consumption and web browsing
o Limited expandability
o Anti-glare screen
o Front and rear facing camera
o Battery powered
o Portable and lightweight
o Uses Bluetooth, WiFi, 3G, 4G, 5G
o Has an on screen keyboard
 Phablet Computers:
o Combine features of smartphones and tablets
o Larger screen than smartphones
o Can be used for phone calls

17
Uses of Mobile Computers

 Office and business management:


o Remote access to office applications
o Email and communication on the go
o Mobile payment processing
o Calendar
 Education:
o E-books and digital textbooks
o Educational apps and tools
o Note-taking and research
 Gaming and entertainment:
o Mobile gaming apps
o Streaming movies and music
o Social media
 Remotely controlled devices:
o Controlling smart home devices
o Remote access to surveillance systems
o Controlling drones and other devices
 Communication:
o Video calling
o Text messaging
 Other:
o Sat Nav
o Online banking
o Searching the Internet
o Taking photos
o Language translation

Advantages and Disadvantages

Advantages Disadvantages

Limited expandability (Difficult to upgrade


Easy to carry and use on the go (Portability)
hardware)
Access to internet and resources from Less powerful (Lower performance compared
anywhere (Flexibility) to desktop computers)
Can be used for various tasks and activities
Shorter battery life (Needs frequent charging)
(Multi-functionality)

Artificial Itelligence & Virtual Reality (AI & VR)

18
Download PDF
AI
 This is the development of computer systems that can perform tasks usually
requiring human intelligence, such as visual perception, speech recognition,
and decision-making

Impact of Artificial Intelligence (AI)

 Enhances productivity by automating repetitive tasks


 Improves decision-making through data analysis and pattern recognition
 Can be used in various industries, such as healthcare, finance, and
transportation
 Raises ethical concerns, including job displacement and privacy issues

VR & AR
 Virtual Reality (VR):
o A computer-generated simulation of a three-dimensional replicated
environment
o It can be interacted with in a seemingly real or physical way
o Can manipulate objects or perform a series of actions
o Makes use of the sensory experience
o Uses a virtual reality headset with built in speakers
o Can be used with gloves / controllers / driving wheel
 Augmented Reality (AR): A technology that superimposes a computer-
generated image or information onto a user's view of the real world, providing
a composite view

Impact of Extended Reality (VR and AR)

 Virtual Reality (VR) immerses users in a simulated environment, while


Augmented Reality (AR) overlays digital information onto the real world
 Used in gaming, education, and training for a more engaging experience
 Can be applied in fields like architecture, medicine, and retail for improved
visualisation and interaction
 Potential issues with addiction and excessive screen time

Worked example

Q.Some smartphones connected to the internet can allow the user to point
their phone’s camera at an object or image to display information about it on
the phone’s screen. The object acts like an item in a search engine. This is
called augmented reality.
One example of its use is in mobile games, where the user tries to catch

19
characters from the game as the characters appear to walk in the streets.
Explain, using examples, other ways in which augmented reality could be used
in everyday life.

[4]

Max three of:

Gather information [1]


Can be used as a direction finder [1]
Visualise what something will look like in real life [1]
Could be used for facial recognition [1]

Max three of:

Examples of gathering information about a building/painting / product [1]


Giving information about the area you are moving in / finding your way in an
airport/railway station / shopping mall etc. [1]
Used by archaeologists / architects / interior designers / try on clothes / trying
makeup/colour of clothing / placing furniture [1]

point it at a word to link to the thesaurus / get it's meaning / translation / modern
landscape [1]
Used by the police to recognise suspects [1]
Exam Tip

 Don't get mixed up between augmented reality and virtual reality - augmented
reality changes the real world in front of you (e.g. Pokemon Go) whereas
virtual reality puts you in a new world entirely and you can't see the real world
around you

Topic: File Mangement

Why Reduce File Size?

 The size of a file determines:


o How much space it will require for storage
o How long it will take to transmit from one device to another
 Often file sizes need to be reduced and will use a form of compression
 The two types of compression are:
o Lossy compression - Unnecessary data is removed and can significantly reduce
file sizes. This is most often used for audio, video and image
o Lossless - Allows the original data to be perfectly reconstructed from the
compressed version without any loss of information or quality. This is most often
used for text and document and software compression

20
 E.g. if 10 images were to be displayed on a website and their original size was 18MB
each, with an internet connection of 32 megabits per second the webpage would take
around 45 seconds to load and require 180 Mb of storage space online to host the
images
 Using lossy compression it is possible to compress the files down to around 10% of their
original size meaning that the same internet connection would require just 4 seconds to
load the images and the storage requirement for the files would be 18MB

How are Files Compressed?

There are many different technical ways that file sizes can be reduced however some simple
methods and techniques for multimedia files are below:

 Images can be compressed by the following:


o Reducing the number of colours in the image (known as the bit depth)
o Reducing the resolution of the image (the total amount of pixels that make up the
image)

 Videos can be compressed by the following:


o Reducing the video resolution
o Reducing the number of video frames per second

 Sound can be compressed by the following:


o Removing frequencies that are outside of the human hearing range

Email: How To Use It


Email - How To Use It

 Email is a method of exchanging messages and files over the internet


 It is used for personal communication, professional correspondence, and marketing
 Acceptable language must be used depending on the recipient of the email e.g.
professional when sending a work related email
 Employers often set guidelines for professional language, content, and frequency of
emails
 Email security is crucial to protect sensitive information from being accessed or altered
 Netiquette refers to the proper behaviour and manners when using email
 Email groups allow for mass communication with a defined set of recipients

 Carbon Copy (CC) is used when you want to include additional recipients to view the
email
 Blind Carbon Copy (BCC) is used when you want additional recipients to view the email
without other recipients knowing
 Forward allows you to send an existing email to a new recipient
 Attachments allow files to be sent along with the email message

21
Worked example

Discuss the advantages and disadvantages of social networking rather than email as a means of
communication.

File Formats
Generic File Formats

 Generic file formats are files types that are compatible and allow sharing between
different devices and software programs
 Non generic files are types that require special software or hardware to be accessed
 Generic file types are needed for the following reasons:
o Generic files allow the exchange of data across many different types of software
and applications
o Generic files are widely adopted and therefore can be accessed by many users or
devices
o A single generic file can be created, edited and accessed across many different
devices

Characteristics & Uses of File Formats

Generic Images Files

 Joint Photographic Expert Group (.jpg)


o JPEG is a widely used image file format
o Uses the lossy compression method
o Significantly reduces file size while maintaining acceptable image quality
o JPEG files are commonly used for storing and transmitting digital photographs

 Portable Network Graphic (.png)


o PNG uses lossless compression
o Preserves high-quality images whilst still providing small file sizes
o Commonly used for web design, digital illustrations, logos, and icons
o Its transparency support allows its graphics to be placed into different
backgrounds easily

 Portable Document Format (.pdf)


o Widely used file format with its
o Ability to retain the layout and formatting of documents across a range of
platforms
o Documents contain text, images, graphics, and even interactive elements.
o Can be password protected to stop unauthorised users from editing
o Allows users to provide a digital signature feature acting as a digital ‘ink
signature’

 Graphics Interchange Format (.gif)


o Used for short, animated images and simple graphics
o Use a lossless compression algorithm

22
o Maintain high image quality while keeping file sizes small
o Used in online platforms, including social media, messaging apps, and websites

Generic Video Files

 Moving pictures expert group layer 4 (.mp4)


o A multimedia container rather than a single file format
o Can be used for video, image, and audio types
o Uses advanced compression techniques to achieve high-quality video playback
o The compression algorithm keeps file sizes relatively small
o Popular for streaming and transferring videos online

 Quicktime Movie (.mov)


o A multimedia container format developed by Apple
o Used for storing video, audio, and other media data
o Can maintain excellent image quality while retaining smaller file sizes
o Suitable for both online streaming and local playback
o Widely used in professional video editing, film production, and multimedia
projects

Generic Audio Files

 Moving pictures expert group layer 3 (.mp3)


o A very popular audio file format known for its high-quality compression
algorithm
o Allows for a significant reduction in file size but minimal differences to sound
quality
o Compatible with a wide range of devices and audio streaming platforms
o Become the standard format for digital music distribution

 Waveform File Audio format (.wav)


o Uncompressed audio file format known for its high lossless quality
o Preserves the original audio waveform.
o Commonly used in the music industry, broadcast, and multimedia production,
where audio quality is the top priority

Generic Text Files

 Text (.txt)
o Used for storing plain text data
o Contains only human-readable text without any additional formatting or styling
o Extensively supported across different platforms and applications
o Can be opened and edited using a word processor or basic text editor

 Rich Text Format (.rtf)


o RTF is a file format used for storing formatted text documents that can contain
different text styles, fonts, colours, and other basic formatting elements

23
o They can be opened and edited using a wide range of text editors and word
processors, making them suitable for creating documents that require basic
formattings, such as letters, reports, and academic papers

 Comma separated values (.csv)


o A plain text file format used for storing data in a structured manner
o Consist of rows and columns, with each cell separated by a comma
o Widely supported
o Easy to import and export data between different applications and platforms
o Commonly used for tasks involving data analysis, database management
o Can be easily opened and edited using spreadsheet software

Generic Compressed Files

 Zip (.zip)
o A container used for compression
o Allows multiple files and folders to be compressed into a single, smaller-sized
archive
o Uses lossless compression algorithms to reduce file sizes
o Compression preserves original content
o Convenient for bundling multiple files into a single package

 Roshal archive (.rar)


o A container used for compression
o similar to .ZIP, however, it uses a proprietary compression algorithm
o Generally results in higher compression ratios compared to other formats
o Commonly used for sharing files over the internet and when space-saving is
essential

Generic Web Development & Browsing Files

 Hypertext Markup Language (.html)


o A global file format used for creating and structuring web pages
o Contain text-based code that defines the structure, layout, and content of a
webpage
o Rendered by web browsers, allowing users to view and interact with web pages
o Used across many different devices and platforms

 Cascading Style Sheets (.css)


o A file format that is attached to an HTML document
o Used to determine presentation and styling such as colours, fonts, layout, and
positioning
o Is widely used in web development to create responsive and attractive designs
o

24
What is a Firewall?

Firewall is a device or a piece of software that is placed between your computer and the external
network (where the hacker is, e.g., the internet).

If you wish to protect your whole LAN from the hacker on the internet, you would place a
firewall between the LAN and internet connection.

What are the tasks carried out by a Firewall?

Firewall carries out the following tasks:


1. Examines the 'traffic' between a user's computer (or internal network) and a public
network (for example, the internet).
2. It checks whether incoming or outgoing data meets a given set of criteria.

3. If the data fails the criteria, the firewall will block the traffic and give the user (or
network manager) a warning that there may be a security issue.

4. The firewall logs all incoming and outgoing traffic to allow subsequent investigation by
the user (or network manager).

5. Criteria can be set so that the firewall prevents access to certain undesirable sites; the
firewall can keep a list of all undesirable IP addresses.

6. It is possible for firewalls to help prevent viruses or hackers entering the user's
computer network.
7. It is also possible for firewalls to help prevent hackers gaining access to the user's
computer or network. This can be done by blocking IP addresses, but it should be
pointed out that hackers can still have access to a computer or network if they are using
an allowed computer.
8. The user is warned if some software on their system is trying to access an external data
source (for example, an automatic software upgrade); the user is given the option of
allowing it to go ahead or request that such access is denied.

The firewall can be a hardware interface that is located somewhere between the computer and
the internet connection, in which case it is often called as a gateway. Alternatively, the firewall
can be software installed on a computer; in some cases this is part of the operating system.

25
All of these issues require management control (or personal control on a single computer) to
ensure that the firewall is allowed to do its job effectively.

What are the circumstances or situations when a firewall cannot prevent potential harmful
traffic?

In the following circumstances the firewall cannot prevent potential harmful traffic:
1. Individuals on internal networks using their own modems cannot be prevented from
bypassing the firewall.

2. Employee misconduct or carelessness cannot be controlled by firewalls (for example,


control of passwords or user accounts).

3. Stand-alone computer users disabling the firewall on the machines, leaving their
computer open to harmful traffic from the internet.

What is a Security Protocol?

Security Protocols are sets of rules used by computers to communicate with each other across a
network — when using the internet.

Explain Secure Sockets Layer (SSL).

Secure Sockets Layer (SSL) is a type of protocol that allows data to be sent and received securely
over the internet.

SSL encrypts the data when a user logs on to a website. Only the user's computer and the web
server understand what is being transmitted. A user can find out whether SSL is being applied if
they see https as part of the website address or the small padlock in the status bar at the top of
the screen.

Explain how the communication between browser and web server takes place using SSL
connection.

26
The user's web browser sends a message so that it can connect with the required website, which
is secured by SSL.

The web browser requests that the web server identify itself. The web server responds by
sending a copy of its SSL certificate to the user's web browser.

If the web server can authenticate this certificate, it sends a message back to web server to allow
communication to begin. Once this message is received, the web server acknowledges the web
browser and the SSI-encrypted two-way data transfer begins.

What are SSL certificates?

SSL certificates are small data files that digitally bind an encryption key to an organisation's
details. When installed on a web server, it shows as the green padlock and the https protocol and
ensures secure connections from a web server to a web browser.

Explain Transport Layer Security (TLS).

Transport Layer Security (TLS) is similar to SSL but is a more recent security system. TLS is a
form of protocol that ensures the security and privacy of data between devices and users when
communicating over the internet. It is essentially designed to provide encryption, authentication
and data integrity (data integrity is maintaining the accuracy and the consistency of data) in a
more effective way than its predecessor, SSL.

When a website and a user communicate over the internet, TLS is designed to prevent a third
party hacking into this communication and causing problems with data security.

TLS is made up of two layers:


1. Record Protocol: This part of the communication can be used with or without encryption.
It contains the data being transferred over the internet.

2. Handshake Protocol: This permits the website and the user to authenticate each other
and to make use of encryption algorithms to establish a secure session between user and
website.

27
Only the most recent web browsers support both SSL and TLS, which is why the older SSL is still
used in many cases. But then the question arises as to what are the main differences between
SSL and TLS, as both effectively do the same thing?

1. It is possible to extend TLS by adding new authentication methods.

2. TLS can make use of session caching, which improves the overall performance compared
to SSL.

3. TLS separates the handshaking process from the record protocol or layer, which holds
all the data.

Session caching

When opening a TLS session, it requires a lot of computer time mainly due to the complex
encryption keys being used. The use of session caching can avoid the need to utilise so much
computer time for each connection. TLS can either establish a new session or attempt to resume
an existing session; using the latter can boost system performance considerably.

Note: A cache is a collection of processed data that is kept on hand and reused in order to avoid
costly repeated database queries.

What is Encryption?

Encryption is a process which converts information into a form that is meaningless to anyone
except holders of the key. E.g., Email message sent by using encryption is meaningless to others
without the decription key. Here, even if the message is hacked or accessed illegally, it is useless
to them without the decryption key, though encryption cannot prevent hacking.

Encryption uses a secret key that has the capability of altering the characters in a message. If
this key is applied to a message, its content is changed, which then makes it unreadable unless
the recipient also has the same secret key. When this secret key is applied to the encrypted
message, it can be read.

28
The key used to encrypt or encode the message is known as the encryption key; the key used to
decrypt or decipher the message is known as the decryption key. When a message undergoes
encryption it becomes cypher script; the original message is known as plain text.

Encryption is used by countries to protect secrets. Military use encryption to protect important
messages sent to the armies. These messages are secret messages and confidentiality is needed
to protect it or guard it from enemies.

Why is Authentication used?

Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.

What is a Digital certificate?

A digital certificate is a pair of files stored on a user's computer. These are used in the security of
data sent over the internet. Each pair of files is divided into:
1. A public key which is known to anyone and

2. A private key which is known to the computer user only.

For example, when sending an email, the message is made more secure by attaching a digital
certificate. When the message is received, the recipient can verify that it comes from a known or
trusted source by viewing the public key information which is usually part of the email
attachment. This is an added level of security to protect the recipient from harmful emails. The
digital certificate is made up of six parts:

1. The sender's email address

2. The name of the digital certificate owner

3. A serial number

4. Expiry date or the date range during which the certificate is valid

5. Public key which is used for encrypting messages and for digital signatures

6. Digital signature of certificate authority (CA) - an example of this is VeriSign.

29
Operating systems and web browsers maintain lists of trusted CAS.

What is use of Passwords in authentication?

When logging on to a system (for example, a bank website), a user will be asked to type in their
password - this should be a combination of letters, numbers and special characters that would
be difficult for somebody else to guess. Strong passwords should contain upper case and lower
case characters, as well as numbers and other keyboard symbols, for example: Ek6@n~9=vmz

When the password is typed in, it often shows on the screen as ********* so nobody overlooking
can see what the user has typed in. If the user's password doesn't match up with the user ID
then access will be denied. Many systems ask for the password to be typed in twice as a
verification check. To help protect the system, users are only allowed to type in their password a
certain number of times - usually three times is the maximum number of tries allowed — before
the system locks the user out. After that, the user will be unable to log on until the system
administrator has reset their password.

For example, if a user forgets their password when using the internet, they can request that the
password is sent to their email address. The password is never shown on the computer screen
for reasons of security.

Passwords should be changed on a regular basis in case they become known to another user or
even a hacker. In particular, it is important to prevent other people gaining access to your
password by way of spyware or viruses.

It is often necessary to use a user ID or log in ID as well as a password. This gives an additional
security level since the user ID and password must match up to allow a user to gain access to, for
example, a bank website.

What is meant by Biometrics?

Biometrics is where parts of a person’s body are used for identification purposes. Biometric
examples include:
1. fingerprint scans

30
2. signature recognition

3. retina scans

4. iris recognition

5. face recognition

6. voice recognition.

All of these parts of the human body are unique from person to person and can be used to
authenticate identity. Before biometric methods be used, people have to perform a process
known as ‘Biometric Enrollment’.

Biometrics are beginning to be used in place of passwords and physical locks as a means of
security.

Biometrics have advantages over these older methods as body parts cannot be lost, forgotten or
stolen as can be the case with passwords and keys. However, biometrics is still a very new
technology and is not yet 100% accurate.

Biometrics is used in a number of applications as a security device. For example, some of the
latest mobile phones use fingerprint matching before they can be operated; some
pharmaceutical companies use face recognition or retina scans to allow entry to secure areas.

Fingerprint scans

Images of fingerprints are compared against previously scanned fingerprints stored in a


database; if they match then access is allowed. The system compares patterns of 'ridges' and
'valleys', which are fairly unique (accuracy is about one in 500). An example of its use would be
as a security method for entering a building.

Advantages of fingerprint scanning applications

1. As every person's fingerprints are unique, this technique would improve security as it is
difficult to replicate a person's fingerprints.

31
2. Other security devices like magnetic cards can be lost or even stolen, which makes them
less effective.

3. It would be impossible to 'sign in' for somebody else since the fingerprints would match
up to one person only on the database.

4. Fingerprints can't be misplaced; a person always has them!

Disadvantages of fingerprint scanning applications

1. Relatively expensive to install and set up.

2. If a person's fingers are damaged through an injury, this can have an effect on the
scanning accuracy.

3. Some people may regard it as an infringement of civil liberties.

Retina scans

Retina scans use infrared light to scan the unique pattern of blood vessels in the retina (at the
back of the eye). It is a rather unpleasant technique, requiring a person to sit totally still for 10
to 15 seconds while the scan takes place. It is very secure as nobody has yet found a way to
duplicate blood vessels patterns (the accuracy is about one in ten million).

What are the impacts of Biometrics on everyday life?

Some impacts of biometrics are discussed below:


1. Better airport security: Iris recognition is already in use in some airports. Travellers have
their eyes and iris scanned into a system and this data is later matched up when the
person is performing airport checks.
2. Increased building secuty: Fingerprint access to buildings have been replacing the older
methods of locks and keys. This method ensures that only authorised people can enter
restricted buildings or rooms.
3. Reduced car theft: Cars already exist that use fingerprints to only unlock their doors or
start the engine for the fingerprint that is registered. This means that the doors will not
unlock for a fingerprint that is not recognised and makes the car harder to steal.

32
4. More secure mobile phones: Mobile phones contain our lives. We use our phones for
everything from social media to shopping online. They need to be as secure as possible
in order to protect the valuable data that they contain.

Give a comparison of six common biometric techniques.

Given below is the comparison of their strengths and weaknesses of the six biometric
techniques:

What are the advantages and disadvantages of the six common biometric techniques?

The following are the advantages and disadvantages of the six common biometric techniques:
BIOMETRIC
TECHNIQUE ADVANTAGES DISADVANTAGES

1. For some people it is very intrusive,


Fingerprint 1. One of the most developed since it is still related to criminal
scans biometric techniques. identification.

2. It can make mistakes if the skin is


2. Very high accuracy. damaged. (e.g., cuts).

3. Very easy to use.

4. Relatively small storage


requirements for the
biometric data created

1. If individuals do not sign their names in


Signature a consistent manner there may be
recognition 1. Non-intrusive. problems with signature verification.

33
BIOMETRIC
TECHNIQUE ADVANTAGES DISADVANTAGES

2. Requires very little time to


verify (about five seconds). 2. High error rate. (one in 50).

3. Relatively low-cost
technology.

Retina scans 1. Very high accuracy. 1. It is very intrusive.

2. There is no known way to 2. Can be relatively slow to verify retina


replicate a person’s retina. scan with stored scans.

3. Very expensive to install and set up.

Iris recognition 1. Very high accuracy. 1. Very intrusive.

2. Verification time is
generally less than five 2. Uses a lot of memory for the data to be
seconds. stored.

3. Very expensive to install and set up.

1. It is affected by changes in lighting, the


Face persons hair, their age, and if the person is
recognition 1. Non-intrusive method. wearing glasses.

2. Relatively inexpensive
technology.

Voice 1. A persons voice can be recorded easily


recognition 1. Non-intrusive method. and used for unauthorised access.

2. Verification takes less than


five seconds. 2. Low accuracy.

3. An illness, such as a cold, can change a


3. Relatively inexpensive person' voice, making absolute
technology. identification difficult or impossible.

How do online credit card frauds happen?

In spite of various security systems that are in place in organisations, online credit card frauds
happen and are very common. The mainly happen because of the following reasons:
1. Hackers gaining access of a user's computer through the use of spyware, phishing or
pharming; any of these methods can trick a user, who is not particularly IT literate, to be
tricked into giving personal and financial details, which in turn, enables the hacker to

34
gain full access to a user's account; this can lead to unauthorised purchases or even
removal of money from an account, if it remains undetected for a few days.

2. If the passwords are weak and no encryption is in place, then it is very easy to break
these passwords and gain illegal access to bank and credit card accounts.

3. Always type in a web address or URL instead of 'copying and pasting' from an email or
other websites as many a times these web addresses/URLs are altered very slightly in
the email and the user ends up visiting a fake website. Once they visit the fake website it
is possible that they will give personal and financial details to a fraudster without the
user's knowledge.

4. If internet access is through wireless technology, it is very important that the wireless
network is password protected as it is very easy to tap into the network without the
password.

5. When using public Wi-Fi hotspots like restaurants or airports, it is important to be very
vigilant as there is always the risk of somebody monitoring internet usage in the area
and trying to tap in to the data that is going to and from any computer using this wireless
link.

6. Even large organisations can be subject to cybercrimes; in recent years, the cloud and
some large retail companies have been the targets for hackers, which leaves customers
very vulnerable. E.g. The recent hacking of servers (May 2020) of UK's low cost airline
Easyjet, where 9 million travellers data was stolen by the hackers.

What are precautions that users can take to avoid online credit card frauds?

There are a number of simple precautions users can take to avoid online credit card frauds:
1. Always use varied and complex passwords for all your accounts.

2. Always check the accuracy of bank accounts on regular basis and resolve any
discrepancies immediately.

3. When providing any personal information on sites ensure that they have 'https' in the
web address or have the 'padlock' icon in the web browser.

35
4. Remember never to provide any personal information to any unsolicited requests for
information as these are often signs of phishing attacks.

5. Never open emails or attachments from unknown senders.

6. On regular basis delete all messages from your spam folder.

7. Report any suspicious phishing activity to the company that is used by the perpetrator.

8. When downloading any software from websites, ensure that they can be trusted.

What is Cloud security?

Several computer, especially tablets and laptops and mobile phone manufacturers, encourage
customers to store or backup their files on a medium known as the cloud. Once users purchase
cloud storage, they can access all their files including photos, videos, music and e-books from
any device anywhere in the world.

This has the following advantages:

1. The need to carry memory sticks or USB drives is done away with, if you wish to access
your files away from home.

2. There is no need to pay for large storage capacity on your computer/tablet or mobile
phones.

3. The possibility of losing irreplaceable data is drastically reduced as the cloud is


controlled by large specialist companies who ensure that your files are backed up
regularly.

4. The backed up files are synchronised automatically across all devices resulting in the
latest version of a file saved on say, a desktop PC at home, being available on your laptop
or even your smartphone.

36
5. Cloud storage is also ideal for collaboration purposes; it allows several users to edit and
collaborate on a single file or document — there is no need to worry about tracking the
latest version or which user made the changes.

However, in spite of all these advantages, security concerns still exist about using cloud storage.
The main fears are data security and data loss.

Data security

When companies transfer vast amounts of confidential data from their own systems to a cloud
service provider, they are effectively relinquishing control of their own data security. This raises
number of questions:

1. The buildings where the data centres are housed what is the physical security that is
available there?
2. Are the cloud service provider's data centres adequately protected against natural
disasters or power cuts?

3. Has the cloud server provider taken adequate safeguards regarding their personnel? Can
they access the confidential data and use it for monetary gains?

Data loss

There is a risk that important and irreplaceable data could be lost from cloud storage facilities.
Actions from hackers (gaining access to accounts or pharming attacks, for example) could lead
to loss or corruption of data. Users need to be certain sufficient safeguards exist to overcome
these potentially very harmful risks.

In late September 2014, three breaches of security involving two of the largest cloud service
providers showed why many of the above fears make people a little nervous of using this facility
to store their important files:

1. The XEN security threat, which forced several cloud operators to reboot all their cloud
servers; this was caused by a problem in the XEN hypervisor (a hypervisor is a piece of
computer software, firmware or hardware that creates and runs virtual machines).

37
2. A recent case where a large cloud service provider permanently lost data during a
routine backup procedure.

3. The celebrity photos cloud hacking scandal, where over 100 'interesting' photos of
celebrities were leaked; hackers had gained access to a number of cloud accounts, which
enabled them to publish the photos on social networks and to sell them to publishing
companies.

All of the reasons above have made individuals and companies nervous about using cloud
service providers. A 'game' between hackers and owners of online service companies continues
to simmer. If users are vigilant when using devices connected to the internet, the possibility of
being a victim of cybercrime is considerably reduced.

Common Network Devices


Common Network Devices
Network Interface Cards (NICs)

 Network Interface Cards (NIC) allow an electronic device to be connected to a


network
 Network Interface Cards are connected to the motherboard but in most modern
systems are usually integrated
 Each network interface card has a unique identifier which is known as a media
access control address or MAC address which is created during the manufacturing
process
 Wireless Network Interface Cards (WNIC) are the same as a NIC but use wireless
connectivity to connect devices to networks

 A MAC address is a 48 bit hexadecimal code where 12 hexadecimal characters are


grouped in pairs

 The general format for a MAC address is that each pair of hexadecimal digits are
separated by a “-”
 An example of a MAC address:
o Microsoft has an OUI of 00-15-5D,
o a new laptop straight out of a Microsoft production line could have a MAC
address of “00-15-5D-45-1B-3F”

Exam Tip

38
 Two completely different products can contain the same Network Interface
Identifier but they must use their own Organisational Unique Identifier
o Microsoft can have the MAC Address 00-15-5D-45-1B-3F
o Amazon can have the Mac Address 0C-5B-8F-45-1B-3F

Hubs

 Hubs are devices that allow several other devices to be connected to them

 Hubs are generally much cheaper than switches but:


o When a hub receives a data packet it will broadcast it to every device on the
network
 This creates two potential issues:
o As the information is being broadcast to every device it will make unnecessary
traffic especially if there are a large number of devices
o As every device will receive the data packet, security may be a concern

Switches

 Switches are also used to connect several devices together just like a hub; however,
rather than sending data packets to all devices on the network, the switch will only
send the data to its intended device

 When a switch receives a data packet, it examines the destination MAC address of
the box and looks up that address in its lookup table
 Once it has found the matching MAC address it will then forward the data packet to
the corresponding port

.Worked example

Q .Explain the difference between a switch and a hub regarding data forwarding
capabilities.
[2]

39
A switch forwards data packets based on the destination MAC address and only sends
data to the intended device [1]
A hub broadcasts incoming data packets to all connected devices [1]
Bridges
 Bridges are used to connect two networks or network segments to create a
single larger network
 An important note is that a bridge cannot communicate with external networks
such as the internet like a router can

Wi-Fi & Bluetooth


Wi-Fi & Bluetooth
 Bluetooth is a wireless communication technology that allows devices to be
connected within a maximum range of about 30 meters
 Before communication can happen, two devices connect using a process
called “pairing” to establish a secure connection
 When two devices pair, they both exchange a cryptographic key. Both these
keys are used to generate a secret shared key which is used to encrypt the
data between the two devices and create a Wireless Personal Area Network
(WPAN)
 Bluetooth operates using a frequency range of around 2.4Ghz
 Connected devices continuously change their transmitting frequency between
79 different channels to avoid interference and improve the reliability of the
connection. This is known as the frequency hopping spread spectrum
(FHSS)
 Bluetooth may be preferred over Wi-Fi when:
o File transfer required between two close-range devices such as a
laptop and smartphone without the need for internet connectivity
o Streaming audio from a smartphone to another wireless device such
as a speaker or headphones
o Connecting to a car system allows for music streaming and hands-free
calling
o When low power communication is required
 Wi-Fi is also a wireless communication technology that allows devices to be
connected up to a range of about 100 meters depending on the standard that
is being used
 Wi-Fi operates across the 2.4Ghz and 5Ghz frequency ranges and although
5Ghz is faster, the 2.4 GHz range is preferred as the lower frequencies often
travel further and penetrate obstacles more easily
 Similar to Bluetooth bands are split into channels
 Wi-Fi-enabled devices connect to a network by connecting to
a hotspot or wireless access point (WAP) also referred to as an access
point (AP)
 Wi-Fi may be preferred over Bluetooth when:

40
o High speed data transfer is required
o Long range communication is required
o Many devices are needed to be connected at the same time

Similarities between Bluetooth and Wi-FI

 Use radio waves for wireless technologies


 Can connect multiple devices
 Support encryption for secure connections
 Based on industry standards that are universally accepted
 It can be used to connect Internet of Things (IoT) devices and applications

Differences between Bluetooth and -Wi-Fi

Bluetooth Wi-Fi

Maximum number of 30 (based on a standard consumer grade router with


7
connections high end options providing substantially more)
Transmission frequency 2.4Ghz 2.4Ghz, 5Ghz
Maximum
30 meters 100 meters (depending on obstructions)
range (meters)
Maximum transfer
speed
3 Mbytes /
75 Mbytes / Sec
Sec
(Depending on the
standard being used)

Q. Worked example

A school IT team is trying to determine what technology they should use to


connect students' tablets around the school for data transfer and are unsure
whether to choose Wi-Fi or Bluetooth technology. Consider the advantages
and limitations of both and justify your answer

[7]

WiFi offers significantly faster transfer rates compared to Bluetooth [1]

so students will be able to upload and download files faster [1]

WiFi coverage can be over a much larger area compared to Bluetooth [1]

41
so that students will be able to access resources wherever they are in the school [1]

Bluetooth however, is easy to set up [1]

students can transfer data without the school having to invest in expensive
infrastructure [1]

Given the current situation, the school is in, the preferred choice for connecting
student's tablets would be Wi-Fi [1]

CLOUD Computing
Cloud computing is a method where data is stored on remote servers and accessed through the
internet
Local storage refers to a storage device that is connected to the computer

The three types of cloud storage are:

Public Cloud - The customer and the cloud storage provider are different companies
Private Cloud - The customer and the cloud storage provider are a single organisation
Hybrid Cloud - Combines both public and private cloud options and allows for sensitive data to
remain private whilst providing public cloud services for less sensitive information
Cloud data is duplicated and stored on other servers to ensure data availability during system
failures, upgrades and maintenance periods
Advantages of Cloud storage
Scalability
As the business requirements change the customer can scale services up or down to meet their
needs
Cost saving
Cloud storage eliminates the need for a business to purchase expensive equipment
for infrastructure and maintenance which can result in significant cost savings
Accessibility
Cloud services are available globally and allow both remote working and data sharing
Reliability
Cloud computing providers offer high levels of uptime ensuring that services are always available for
its users
Storage Space
Cloud services can offer an almost unlimited amount of storage
Backup and recovery
If a customers machine or storage device fails, a backup of the data from the cloud will allow for
recovery
File Synchronisation
Files can be synced across multiple devices
Convenience
A user does not need to carry storage devices around with them as all data is stored on the cloud

Disadvantages of Cloud Storage

42
Internet Connection
A stable internet connection is required to use cloud storage
Security
Storing data in the cloud may be vulnerable to security breaches
Dependency
The user is dependent on the storage provider for the availability and reliability of its services
Ceases to trade/dissolve
Should the company dissolve or cease to change, all cloud data may be lost
Cost
As the amount of storage or bandwidth required increases, the service may become expensive over
time

Worked example
Explain the difference between cloud storage and local storage
[2]
Cloud storage involves storing data on remote servers accessed via the internet [1]
While local storage refers to storing data on physical devices like hard drives or flash
drives [1]

Extranet, Intranet & Internet


Download PDF
Internet
 The Internet is a very large global network that consists of many
other interconnected networks
 The world wide web is the vast collection of web pages that can be accessed
using a web browser
 The world wide web allows you to access information by using the
internetExam Tip

 You must be very clear about the difference betwenternet

 Open
o The Internet is an open network meaning anyone with access can
access the same resources and information as everybody else
 Decentralisation
o The Internet is a decentralised network with no owner, controller or
governing body. Instead, it is made up of vast numbers
of interconnecting networks that operate independently but work
together to provide communication
 Global Reach

43
o The internet is a global network meaning that people from all over the
world can communicate with each other in real-time
 Accessibility
o The Internet is available to anyone who has a suitable device and
access to any one of the interconnected networks

The Internet has many uses and plays a critical role in our lives. This can include;

 Education and training


 Social Networking
 Online shopping
 Entertainmenttr

INTERNET,EXTRANET, INTRANET

 Intranets operate in a similar way to the Internet and although they are
still networks, they are usually private and are used to send information
securely and safely
 Unlike the Internet which is a global network accessible by all, access to an
organisation’s Intranet is restricted and only accessible to authorised users
such as employees

 Intranets have many advantages over the internet such as:


o Better bandwidth than the internet
o Data is kept within the organisation
o Less chance of hacking and attacks
o Administrators can manage access to external sites and links

Charact

eristics of an Intranet

 Private
o An intranet is a private network that is accessible to employees within
a company or organisation
 Security
o An intranet is usually behind a firewall to ensure security and that only
authorised users can access it
 Sharing and Communication
o An Intranet allows for document sharing and the use of collaboration
tools between users. It can also allow the use of email and video calling
to enable efficient communication within the organisation
 Customisation

44
o An intranet can be customised to meet the specific requirements of the
business such as navigation and subject content as well as the service
being able to be scaled up as the business grows
 Users will require a username and password to access the Intranet

Extranet
 An extranet is a private Intranet that also allows access by selected parties
that reside outside of the organisation. These parties, for example, maybe
customers, key stakeholders or clients
 External users will have an authorisation level once they have successfully
logged in which will determine which resources they may access

 Similarities between the Internet, Intranet and extranet are as follows:


o They are all web based technologies
o They allow users to access information remotely
o They all use client server architecture
o They all use security measures such as authentication and encryption
o They all promote and facilitate information and resource sharing
 Differences between the internet, intranet and extranet are as follows:
o The internet is a global network whereas an intranet/extranet is a
private network contained within an organisation
o The use of the internet covers a wide range of purposes whereas
an intranet/extranet is designed for specific users and purposes
o Much of the information is publicly available whereas
an intranet/extranet is not
o The internet is not owned solely by one person or organisation whereas
intranets/extranets are owned usually by the organisation

Worked exam

ple

Q.A company uses an Intranet. Explain what is meant by an Intranet

[2]

An Intranet is a private network that is accessible to employees of the organisation


and not to members of the public [1]

It provides employees access to company information and to share resources


internally [1]

45
LAN & WAN
Download PDF
LAN
 Local Area Networks (LANs) are networks that are usually contained within
a single building or small geographical location
 A LAN is made up using hubs and/or switches which will connect several
devices together
 It is common for one hub or switch to be connected to a router which will
allow the LAN connectivity to other outside networks such as the internet

 A LAN can offer many advantages such as:


o Centralised management - A LAN allows centralised management of
updates, backups and software installations.
o Security - A LAN can secure its devices with the use of firewalls,
antivirus software and other security features to prevent unauthorised
access
o File Sharing and Collaboration - A LAN allows users on the network to
share resources such as printers and other peripherals. This also
allows the users of the network to collaborate and share files and
folders

 Disadvantages of a LAN include:


o If hardware fails, the network may not function properly or even at all
o Networks are more prone to attacks than standalone computers
o Access to data and peripherals can be slow depending on network
traffic
o Maintenance - LAN networks require maintenance to ensure that
software is up to date, upgrades and backups which can be costly

WAN
 Wireless LANs (WLANs) are Local Area Networks that allow devices to
connect wirelessly rather than using physical cables
 Wireless Access Points (WAPs) are connected to an existing wired network
which provides a means to connect wirelessly
 Wireless Access Points use spread spectrum technology that has a range
of around 30 to 50 metres compared to Infrared which has a range of around
3 metres
 WLANs are often used when it is not practical to use cable or devices that
will access the network do not have Ethernet ports
 WLANs support a vast range of devices such as smartphones and laptops
and are very popular in public areas such as shopping malls

46
 Advantages of a WLAN include:
o Mobility - WLAN allows users to connect anywhere that is in the range
of a Wireless Access Point (WAP) without the need for additional
hardware or wiring.
o Flexibility - WLANS can be used in a variety of environments both
indoors and out making them highly flexible
o Scalability - As the requirements change, additional Wireless Access
Points can be added relatively easily resulting in additional users being
able to use the network or increased network coverage
o Wireless devices have access to peripherals such as printers

 Disadvantages of a WLAN include:


o Coverage - WLANS are limited in their coverage and can be further
affected by walls and other structures
o Bandwidth - Bandwidth speeds can become an issue in high traffic
areas
o Interference - WLANs can sustain interference from other devices
which can affect performance and connectivity
o Security - WLANs can be vulnerable to security threats due to wireless
signals being intercepted

Worked example

Q. Give 2 reasons why a fitness centre may want to install a WLAN

[4]

The fitness centre may wish to install a WLAN for several reasons such as :

Customers can connect to their Wi-Fi and search for information such as class times
etc [1]

will improve customer services [1]

Staff at the fitness centre will be able to access resources wirelessly such as
printers [1]

allowing them to move freely around the centre [1]

Security Issues

 When moving electronic data from one place to another, there are different
types of security concerns to consider:

47
o Data interception can occur when an unauthorised user intercepts
data being transferred.
 Two common methods are:

 Packet sniffing

 Man in the middle attack

 Encryption can be broken if it is not strong


 Using HTTP instead of HTTPS protocols when dealing with sensitive
information
 Depending on whether the data being sent is sensitive will depend on the level
of security needed to ensure it stays safe
 All types of information will need to be transferred from one place to another at
some point but typical examples may include:
o User credentials when logging into online banking
o Medical records being passed from a hospital to a GP
o Student details from one school to another
o Criminal records and details

 When dealing with personal or sensitive data it is essential that not only is it
protected from hackers but also that it is protected from accidental disclosures
such as:
o Sending an email with sensitive information to the wrong person
o Losing a device that has sensitive data stored
o Shared access misconfigurations allow unauthorised users access to
sensitive data

Passwords & Authentication


Passwords

 Passwords are a common form of security and are often accompanied by a


username or email address
 This type of security is often seen when accessing online banking, virtual
learning environments, email accounts and many more
 There are many ways to enhance the security of your password such as the
following:
o Ensure that the password is changed regularly in case it has been
obtained illegally or accidentally
o Ensure that the password uses a combination of uppercase, lowercase,
numbers and symbols to make the password more difficult to guess
o iloveict is a weak password
o 1lov3ICT# is a strong password
 Passwords should not contain personal information related to you such as
your date of birth, your name or the name of your pet

48
 Anti spyware software can be run regularly to ensure that your information
including your password is not being passed to an unauthorised third party
user

Authentication
 There are also other forms of authentication aside from passwords that
utilise what is known as “zero login”
 This aims at removing or reducing the need for the user to manually input their
details and instead rely on the system to verify the users credentials
automatically
 One such type is known as biometrics where the user's fingerprints or facial
features are scanned to provide unique biometric information
to authenticate the user's details.
 Newer methods of zero login types of authentication include the use of
networks, location, device data and human behavioural patterns to recognise
users automatically.
 Although these methods offer many advantages there are some concerns that
need to be taken into consideration. They include:
o What personal data is being collected?
o Is the collected data being kept securely?
o Will it log in and out at the correct times?

Magnetic Stripe Cards

 Magnetic stripe cards are a form of card that stores the user’s data on a
magnetic strip usually on the reverse side
 The user scans the card through a reader where the details stored on the card
are compared to the details stored within the system. It the data from the card
matches the data that is store on the system the user is authenticated and
granted access
 The advantages to use magnetic stripe cards include:
o Widely used and accepted
o Cheap
o Simple to use
o A single card can serve multiple purposes within an organisation such
as doors, purchasing food from canteens and accessing IT equipment

 Disadvantages to magnetic stripe cards include:


o Some cards use a holographic or photographic ID to detect forged or
stolen copies
o The card can may need to be scanned multiple times before the user
is accepted and authenticated
o Cards can become damaged or wear out over time (especially with
constant use)
o Cards can be easily cloned

49
Smart Cards

 Smart Cards are cards that contain a chip and can be used as contactless
 The card does not need to be inserted or swiped through a machine and can be
detected from a short distance away
 Personal identification information can be stored on the card such as name,
address, date of birth and/or banking information
 The information on the card is encrypted which means it can only be read by
authorised devices
 Often the card will require a personal identification number (PIN) which is
needed to access the information, providing an additional layer of security
 Advantages of smart cards include:
o Durable
o Use for a wide range of applications (Payments, Access Control,
Storing personal data
o Enhanced security (Compared to standard cards)
 Disadvantages of smart cards include:
o Risk of loss
o Initial Infrastructure requirements
o More expensive compared to traditional cards

Physical Tokens

 A Physical Token enables authentication with the use of a small physical


device
 To access a system that uses a physical token, a user will enter their
username and password into the system, and then enter the security code
generated by the token
 The physical token can be directly connected to the device that the user is
trying to access or the physical token will generate one time password
(OTP) which is then entered into the system manually
 To obtain a one time password (OTP) the user will enter their personal
identification number (PIN) and any other authentication requirements into
the physical token device. If all requirements are satisfied then an internal
clock will be used to generate the one time password (OTP) which is
displayed on its screen
 To enhance security, the one time password (OTP) changes frequently and
each code will only be valid for a short period of time (usually within 1 minute)
 Advantages of physical tokens include:
o Offline authentication
o Portable

 Disadvantages of physical tokens include:


o Cost
o Loss or theft of the physical token
o Physical dependance

50
There are two typical of physical token:

 Disconnected physical token


o When using a disconnected physical token, a separate device is used
to generate the one time password (OTP) which the user will then
enter into the system manually

 Connected physical token


o When using a connected physical token, the one time password
(OTP) is generated and passed to the system automatically though a
physical connection and does not require to user to enter the password
manually

Electronic tokens

 Electronic Tokens are a form of application software that is installed on a


user's device (usually smartphone) to allow them to authenticate their details
and allow them to access a secure website
 A user must download and register the electronic token software app prior to
accessing the secure website
 As the website prompts for authentication, the user will open the app that will
provide a one time passcode (OTP) which will be entered into an entry box
on the website along with other forms of authentication such as a username
and personal identification number (PIN)
 Both the web server and the smartphone application have synchronised
clocks which will generate identical numbers and should
the authentication details match, the user will be granted access to the
website
 The above explanation is just one method of authentication when using
electronic tokens. Another method is as follows:
o The website will prompt the user for their username and password
o Upon successful credentials the website will generate a code
o The code is then entered into the application software on the users
phone which will generate another code
o The generated code from the application software is then entered into
an entry box on the website
o Should all authentication methods pass successfully, the user is
granted access to the website.

Anti-malware
51
Anti-malware
 Anti-Malware (also known as Anti Virus software) is designed to protect
devices against viruses and malicious software

 Anti-malware has 3 mains purposes, detect, prevent and


remove malicious software

 Anti-Malware is installed onto a computer system and will operate in the


background

 Common features of Anti-Malware software include the following:


o Comparing the scanned files against a large database of known
threats
o Real-time scanning
o Regular updates to gather an up to date list of known threats
o Quarantine of infected files
 Quarantining files allows threats to be automatically deleted
 Allows the user to determine if the file is a legitimate threat and
not a false positive
o Scanning external storage media such as USB flash drives to prevent
viruses from being loaded onto the computer system
 The scanning of downloaded software to ensure that it is free
from any threats


o Heuristic checking
 This is the identification of potential threats within a file from
behavioural patterns and characteristics rather than just relying
on a database of known viruses

Worked example

Q. Give two examples of how Anti-Malware protects devices against malicious


software

[4]

Regular updates by the Anti-Malware software will keep an up to date list of


threats [1]

If any of the threats are detected on the device, the Anti-Malware software will
quarantine the files [1]

52
Anti-Malware software will scan external storage media when they are connected to
the device [1]

Preventing viruses from being transferred from storage media onto the device [1]

Microprocessor Controlled
Devices
Download PDF
Microprocessor Controlled Devices
A microprocessor is a small computer chip that can be used to control devices. It is
made up of a central processing unit (CPU), memory, and input/output (I/O) devices.
The CPU is responsible for carrying out instructions, the memory stores data, and
the I/O devices allow the microprocessor to communicate with the outside world.

Microprocessor controlled devices are used in a wide variety of applications,


including:

 Household appliances, such as washing machines, refrigerators, and ovens


 Office equipment, such as printers, scanners, and photocopiers
 Industrial machineries, such as robots and assembly lines
 Transportation, such as cars, aeroplanes, and trains
 Medical devices, such as pacemakers and insulin pumps

Impact of Microprocessors on Home Life

 Positive effects on lifestyle, leisure, physical fitness, and data security


include:
o Convenience
 Devices such as smart thermostats, lights, and appliances can
be controlled remotely, saving time and effort
 People have more time to spend on the things they want
 Smart fridges automatically order fresh food and therefore
reduce food waste
o Fitness tracking
 Devices like smart watches monitor physical activity and health
data, encouraging healthier lifestyles
o Security
 Smart security systems provide real-time surveillance, adding an
extra layer of protection to homes
 Negative effects include:
o Privacy risks
 These devices can be vulnerable to hacking, risking the security
of personal data

53
o Social interaction
 Over-reliance on these devices can decrease face-to-face
interaction, impacting social skills
o Physical fitness
 Despite fitness tracking, sedentary behaviour may increase due
to the convenience of smart devices

Impact of Microprocessors on Transport

 Positive effects on data security, autonomous vehicles, and transport safety


include:
o Efficiency
 Autonomous vehicles optimise routes, reducing travel time and
fuel consumption
o Safety
 Advanced safety features, like automatic braking and lane
assist, can reduce accidents
o Data security
 Real-time tracking and encryption help protect against theft or
loss
 Negative effects include:
o Privacy issues
 Data collected by these vehicles could be misused or hacked
o Job losses
 Autonomous vehicles could replace jobs in transport industries,
leading to unemployment
o Safety risks
 Malfunctions in autonomous vehicle systems could lead to
accidents

Worked example

Q. Microprocessor-controlled devices in the home have had positive effects on


people’s lifestyles. One of the positive effects of using these devices is that we
can now set a cooker to switch on whilst we are out so that we arrive home to
a cooked meal. Describe the positive effects of using other microprocessor-
controlled devices in the home.

[4]

Four of:

Microprocessor-controlled devices reduce the need for people to do manual tasks at


home [1]
People can use microprocessor-controlled devices for physical fitness tracking in the
home [1]

54
People have more time to spend on leisure activities/shopping/socialising [1]
Increased sense of security as homes are protected with burglar alarms/ smoke
alarms/fire alarms [1]
Smart fridges can be used to improve healthy lifestyle//Smart fridges automatically
order fresh food//Smart fridges reduce food waste [1]
Microprocessor-controlled devices can be set remotely using a smartphone [1]
Saves fuel as the heating/air conditioning is not on all day [1]
Reduces injuries by using microprocessor-controlled lights outside [1]

Health Issues
Health Issues When Using Computers
Common health issues related to extensive ICT use include:

 Repetitive Strain Injury (RSI)


o A condition affecting muscles and nerves, often caused by repetitive
movements and overuse
 Back problems
o Poor posture while using devices can lead to back pain and other
related issues
 Eye problems
o Strain and fatigue from staring at screens for long periods can harm
vision
 Headaches
o Overuse of ICT devices can cause headaches, usually due to eye
strain or poor posture

Health Issue Causes Prevention Strategies

Repeated physical movements


Repetitive Regular
do damage to tendons, nerves,
Strain breaks, ergonomic equipment, and
muscles, and other soft body
Injury (RSI) correct typing techniques.
tissues.
Back Poor posture, particularly when Correct posture, ergonomic
problems using devices for long periods. furniture, and regular movement.
Eye Prolonged screen time leads to Regular breaks from the screen,
problems digital eye strain, characterised appropriate screen brightness, and

55
Health Issue Causes Prevention Strategies

by dryness, irritation, and maintaining an appropriate distance


blurred vision. from the screen.
Factors such as poor posture, eye Regular breaks, maintaining good
Headaches strain, or stress from overuse of posture, and ensuring proper screen
devices. brightness.

Communication Media
Communication Media
Communication media is the various methods and channels used to convey
information and messages between people, organisations, and devices.

 Newsletters: Periodic publications, often used to inform, educate, or entertain


subscribers about specific topics
o Usually distributed through email or as printed copies
o Suitable for organisations, schools, and clubs to keep members up-to-
date
 Posters: Visual presentations that convey information or promote events or
products
o Combine text, images, and graphics to grab the attention
o Used for advertising, public service announcements, and event
promotion
 Websites: Online platforms that provide information or services
o Accessible through the internet using a web browser
o Useful for businesses, educational institutions, and individuals to share
information, sell products, or offer services
 Multimedia presentations: Digital presentations that combine various forms
of media, such as text, images, audio, and video
o Used in education, business, and entertainment to present information
in a visually engaging way
 Audio: Sound recordings, such as podcasts, music, and radio shows
o It can be streamed or downloaded for offline listening
o Suitable for providing information, entertainment, or educational content
 Video: Moving images with or without sound, used for entertainment,
education, or promotional purposes
o Can be streamed or downloaded for offline viewing
o Typical platforms include YouTube, Vimeo, and social media websites
 Media streaming: Real-time transmission of audio and video files over the
internet
o Allows users to access content without downloading it to their devices

56
o Popular services include Spotify, Netflix, and YouTube
 ePublications: Digital versions of printed materials, such as eBooks,
eMagazines, and eNewspapers
o It can be read on electronic devices, such as eReaders, tablets, and
smartphones
o Offer benefits like portability, searchability, and adjustable text size

Mobile Communication
Mobile Communication
There are various ways mobile devices are used for communication:

 SMS messaging: Short Message Service allows sending and receiving text messages
up to 160 characters long
o Uses cellular networks
o Can be sent to multiple recipients at once
 Phone calls: Traditional voice calls made and received through mobile devices
o Uses cellular networks or Voice over Internet Protocol (VoIP) services
o Provides real-time communication
 VoIP: Voice over Internet Protocol enables voice calls over the Internet instead of
traditional phone lines
o E.g. Skype, WhatsApp
o Can provide better call quality and lower costs compared to traditional calls
 Video calls: Real-time video conversations between two or more users with a camera-
enabled device
o Uses internet connection or cellular data
o E.g. FaceTime, Skype, and Zoom
 Accessing the Internet: Mobile devices can connect to the Internet using Wi-Fi or
cellular data
o Allows users to browse websites, send and receive emails, and use social
media

Electronic Conferencing
Video Conferencing

 Hardware required

57
o Tv Screens/Monitors
o Speakers
o Microphone
o Webcam
o Video Conferencing System
 Characteristics
o Video conferencing is an alternative for face to face meetings between
two or more people
o Allows both sound and video
o Participants of the video conference can be many miles apart or even
in a different country
o Audio and video are real-time allowing users to interact with each other
 Uses
o Remote employee meetings
o Staff interviews
o Multi-person discussion
o Remote training
o Video conferencing has many uses that include:
 Advantages
o Convenience
o Cost saving
o Better for the environment
o Attendees do not have to travel to the event
o Anyone within the company can attend regardless of location
o Events can be held at short notice as travel is not required
o Allows other members outside of the organisation to attend easily
without having to visit on premises
o Some video conferencing software allows record and playback to allow
members to review the meeting

 Disadvantages
o The initial purchase of equipment can be costly
o This can cause issues amongst employees when working across
different time zones
o Those using the system may need to be trained to use it effectively
which can:
 Take time
 Be costly
o Video conferencing systems require a strong and stable network
connection
o There can often be a delay in response times
 The time lag is caused by the image not being synchronised with
the sound

o Poor picture/sound quality caused by the speed of connection/quality of


the hardware
58
Worked example

Q. A motor car company has some designers based in London and some in
Beijing. The cost of travel between the two cities is very high, so when they
wish to meet to discuss new products they use video-conferencing.
The designers all have PCs with a keyboard and a mouse in order to take part
in video-conferencing.
a. Name three other devices used to input or output data which would be
needed to take part in the video-conference.

[3]

Three of:

Webcam / video camera [1]


Speakers / headset / headphones [1]
Large monitor / television / data projector [1]
Microphone [1]

b. Describe three potential problems of the designers using video-conferencing


systems rather than meeting in either London or Beijing.

[3]

Three from:

Time lag / lip sync caused by the image not being synchronised with the sound [1]
Poor picture quality caused by the speed of connection / quality of the hardware [1]
More likely to have poorer sound quality caused by the quality of the hardware /
connection [1]
Confidential material about the new cars may have to be signed / viewed in
person [1]
The new car may have to be viewed in person [1]
Hardware breakdown stops the conference taking place [1]
Communication breakdown stops the conference taking place [1]
Different time zones will mean the conference has to take place at inconvenient
times [1]
Audio Conferencing

 Hardware required
o A landline phone
o Internet Phone
o Computer (requires a microphone and speakers)
 Characteristics

59
o Voice communication only (no video)
o Audio is in real time
o Call management options (mute etc)
o Participants of the audio conference can be many miles apart or even
in a different country
 Uses
o On the go business meetings
o Allows a hybrid collection of devices such as landline telephones,
smartphones and laptops (providing it is a VoIP call)
 Advantages
o Attendees do not have to travel to the event
 Convenience
 Cost saving
 Better for the environment
o Anyone within the company can attend regardless of location
o Events can be held at short notice as travel is not required
o Allows other members outside of the organisation to attend easily
without having to visit on premises
o Audio conferencing is more cost effective as it requires less bandwidth
and less expensive equipment
o Audio conferencing can integrate with many other devices and tools for
communication
o Audio conferencing provides a higher level of security as users are not
sharing a screen

Disadvantages

o Can be difficult to determine who is the speaker


o Limited interaction
o Lack of visuals:
 Body language
 Users sharing visual content
o This can cause issues amongst employees when working across
different time zones

Web Conferencing (Webinar /Webcast)

 Hardware Required
o Computer (requires webcam, microphone and speakers)

 Characteristics
o Allows both sound and video

60
o Participants of the web conference can be many miles apart or even in
a different country
o Audio and video are real time allowing users to interact with each other
o Allows virtual breakout rooms for teams of participants
o Screen and slide presentations
o Instant messaging
o Document sharing

 Uses
o Distance learning and education
o Online presentations
o Online team collaboration
o Interviews
o Customer support
o Virtual events

 Advantages
o Attendees do not have to travel to the event
 Convenience
 Cost saving
 Better for the environment
o Anyone within the company can attend regardless of location
o Events can be held at short notice as travel is not required
o Allows other members outside of the organisation to attend easily
without having to visit on premises
o Web conferencing software often allows recording and playback
features to allow members to review the event
o Enhanced visual presentations compared to video conferencing
o Real time collaboration

 Disadvantages
o Requires a strong and stable network connection
o Security and privacy concerns
o Distractions from other activities on the device
o Those using the system may need to be trained to use it effectively
which can:
 Take time
 Be costly
o Dependent on users being technically savvy and having suitable
devices/network connections

Differences of Online Conferencing Types

Audio Conferencing Video/Web Conferencing

61
Requires less bandwidth Requires more bandwidth
Less Social More Social
No Visual Engagement Visual Engagement
No option of non verbal cues Use of nonverbal cues
Fewer resources needed More Resources needed
Exam Tip

NB: Both web conferencing and video conferencing are very similar
however, the key differences are:

o Video conferencing has a focus on face to face communication


o Web conferencing has a focus on interaction and collaboration such as
document sharing, whiteboards etc

Computer Modelling
Computer Modelling
Computer modelling is the use of computer programs and algorithms to simulate
and analyse complex systems or processes. The accuracy and reliability of computer
models depend on the quality of input data and algorithms used.

 Personal finance: Budgeting, investment planning, and financial forecasting


o Helps individuals and families manage their finances effectively
 Bridge and building design: Structural analysis and simulations to test
designs
o Ensures the safety and stability of structures before construction
 Flood water management: Predicting and analysing flood risks and
mitigation strategies
o Supports planning and decision-making for disaster management
 Traffic management: Analysing traffic patterns and optimising transportation
systems
o Aids in reducing congestion and improving traffic flow
 Weather forecasting: Using complex algorithms and historical data to predict
weather conditions
o Helps people plan and prepare for upcoming weather events

Advantages Disadvantages

62
Dependence on accurate input data and
Faster calculations and processing
assumptions
Limited by the quality and complexity of the
Reduced human error and bias
algorithms used
Ability to simulate multiple scenarios and May overlook unique or unpredictable situations
test different variables not covered by the model
Better visualisation of complex data and Can be expensive and time-consuming to develop,
systems maintain, and update models

Computer Controlled Systems


Computer Controlled Systems
Computer controlled systems use computers and software to control, monitor, and
manage processes, machines, or devices. The effectiveness of computer controlled
systems depends on the quality of software, hardware, and input data.

 Robotics in manufacture: Automation of production processes using robots


o Improves efficiency, precision, and productivity
 Production line control: Supervising and managing assembly lines with
computer systems
o Ensures quality control and reduces human error
 Autonomous vehicles: Self-driving cars and drones guided by computer
algorithms
o Enhances safety, reduces traffic congestion, and increases fuel
efficiency

Advantages and Disadvantages of Computer Controlled Systems

Advantages Disadvantages

Increased efficiency and productivity High initial investment and maintenance


(due to working 24/7) costs

63
Greater precision and accuracy Job displacement for human workers

Ability to operate in hazardous Dependency on reliable software and


environments hardware

Lack of flexibility and adaptability to


Reduced human error and fatigue
unexpected situations
Can work with large or delicate items Requires costly backup systems
Worked example

Q The European Space Agency (ESA) is building a new space telescope to


orbit the Earth and search for distant galaxies. The ESA is using computer
controlled robots to build the lens of the telescope.
Discuss the advantages and disadvantages of using computer controlled
robots rather than humans to build the lens.

[6]

Max 4 of:
Advantages

Robots can work in sterile areas where humans would need protective clothing [1]
Robots can easily be used for transferring large delicate items [1]
Robots can work 24/7 / continuously [1]
Cheaper in the long run/robots not paid [1]
More accurate as the lens needs to be precise / higher quality of lens [1]
More frequent checking of the equipment/lens [1]
They do boring/laborious work [1]
Issues can be found more quicker [1]
Task/job can be carried out far quicker [1]

Max 4 of:
Disadvantages

Very expensive to buy / higher in the short term [1]


Maintenance is very expensive [1]
Difficult to re-program when changes are made [1]
Requires expensive backup systems [1]
They replace skilled workers, leading to de-skilling [1]
They need constant observation which increases the cost of maintenance crews [1]
If something goes wrong, it may be difficult to find the error [1]

Exam Tip

64
 Some of the advantages/disadvantages listed above don't always apply
depending on the scenario. Choose the ones appropriate for the scenario in
the question
 You can't get full marks by only focusing on advantages or disadvantages -
make sure you know both
 Don't use short answers like 'it's expensive' - explain your answer

School Management Systems


Download PDF
School Management Systems
School management systems are software applications designed to manage
various aspects of educational institutions, such as student registration, attendance,
performance tracking, and online learning.

 There are various ways school management systems are used in educational
institutions:
o Learner registration and attendance: Recording and tracking student
enrolment and daily attendance
 Simplifies the registration process and ensures accurate record-
keeping
o Recording learner performance: Monitoring and analysing student
grades, test scores, and overall performance
 Helps teachers identify areas for improvement and track
progress
o Computer aided learning: Facilitating online learning resources and
activities for students
 Enhances the learning experience and promotes self-paced
learning

 Advantages of using school management systems:


o Streamlined administration and record-keeping
o Improved communication between teachers, students, and parents -
this can be automated
o Centralised access to information and resources
o Data-driven decision-making and insights for teachers and
administrators
o Information is more up to date
o Information can be obtained quickly in an emergency
o Patterns of absence can be found quickly which helps to tackle
truancy/lateness

Worked example

65
Q. A school is setting up a new computerised system to manage many
aspects of the school administration.
a. Describe how this system can be used to manage student registration and
attendance.

[3]

3 of:

Student scans a card // teacher records the student as present on the computer
system [1]
The system records the time of arrival [1]
The system sends the data to the school administration database [1]
The data is searched in the database [1]
If a student arrives after a certain time the student’s attendance record is flagged as
late/absent [1]
Attendance/lateness records are automatically printed/sent to parents [1]
Letters/texts are automatically sent to parents to show the absenteeism/lateness of
students [1]
Parents can log in into the system to check student’s attendance/lateness records [1]

b. Describe the benefits of using this system.

[2]

2 of:

The information is more up to date [1]


Information about the student can be obtained quickly after a fire/emergency [1]
Information regarding patterns of absence can be found quickly [1]
Helps to tackle truancy/lateness [1]
Parents can be informed automatically about patterns of lateness/attendance [1]
Lateness is entered consistently in the school [1]
Automatic lateness reports for the form tutor can be generated [1]
Accurate/up to date records if there is a fire [1]
Speeds up the process as attendance is not marked manually [1]

Online Booking Systems


Download PDF
Online Booking Systems
Online booking systems are web-based platforms and applications that allow users
to reserve and purchase tickets or services for various events and industries.

 Travel industry: Booking flights, hotels, and holiday packages

66
o Provides a convenient platform for travellers to plan and book their trips
 Concerts: Reserving tickets for live music events
o Allows music fans to secure their spot at popular concerts
 Cinemas: Booking movie tickets in advance
o Enables cinema-goers to reserve seats and avoid queues
 Sporting events: Purchasing tickets for sports matches and competitions
o Offers sports enthusiasts an easy way to attend their favourite events

Advantages and Disadvantages of Online Booking Systems

Advantages Disadvantages

Convenience and accessibility Potential for technical issues and


(24/7 booking) downtime
Instant confirmation and
Possible security and privacy concerns
ticketing
Ability to compare prices and
Transaction and booking fees
options

Promotions and personalised Impersonal and less tailored customer


offers service
Faster to change/cancel Internet connected devices required
Automated reminders via
Staff may lose their job
email/text
Repeated bookings can easily
be made
Staff are freed up to do other
things
Worked example

Q. RockIT Airlines representatives use a computer booking system to book


flights for customers. A representative from the airline types in the customer
reference number, the number of passengers, departure time, departure date,
departure airport and the destination airport. Describe the processing and
outputs involved in making the booking.

[6]

6 of:

67
Display flights available [1]
The booking database is searched for the customer reference number [1]
A matching record is retrieved [1]
Details of the customer are displayed on the screen [1]
The booking database is searched for matching departure airports [1]
The booking database is searched for matching destination airports [1]
If the flight correct, the date/time found [1]
Search if seats/tickets/flights available [1]
If unavailable error message output [1]
Outputs the price [1]
If seats are available, flags seat as booked [1]
If not booked then the flag removed [1]
Reduces the number of seats/tickets available by the number booked [1]
E-ticket/ticket details are output [1]
E-ticket/ticket details sent to customer [1]
A receipt is printed//Verification email sent [1]

Banking Applications
Download PDF
Automatic Teller Machines (ATM)
Automatic Teller Machines (ATM) is an electronic banking terminal that provides
customers with access to financial transactions

 Characteristics and uses of ATMs:


o Withdrawing cash: Obtain money from a bank account
o Depositing cash or cheques: Add funds to a bank account
o Checking account balance: View the current balance of a bank
account
o Mini statements: Obtain a summary of recent transactions
o Bill paying: Settle utility bills and other payments
o Money transfers: Send funds to another bank account

Advantages and disadvantages of ATMs

Advantages Disadvantages

Convenient access to banking


Risk of theft or fraud
services

68
Limited services compared to bank
Available 24/7
branches
Technical issues and machine
Reduced waiting time
downtime
Fees for transactions at non-
Global access to funds
network ATMs
Electronic Funds Transfer (EFT)
 Characteristics and uses of EFT:
o Transfer of funds between bank accounts electronically
o Utilised for bill payments, salary deposits, and online purchases
o Utilises NFC in contactless payments
 The process of EFT:
o The data is read from the chip (using RFID / NFC if it's a contactless
payment)

o The business bank's computer contacts the customer’s bank's


computer

o The card is checked if it is valid

o If the card is valid the transaction continues

o If it is not valid the transaction is terminated

o An authorisation code is sent to the business

o The price of the item is deducted from the customer’s account

o This money is added to the business' account

Advantages and disadvantages of EFT

Advantages Disadvantages

Fast and efficient Risk of online fraud


Reduces
Technical issues
paperwork
Lower transaction Requires internet
costs connection
Worked example

69
.Q.Adam is paying his bill in a restaurant using a contactless debit card.
Describe the computer processing involved in Electronic Funds Transfer (EFT)
using contactless cards.

[4]

4 of:

The reader checks the amount to pay is less than the contactless limit [1]
The data is read from the chip using RFID / NFC [1]
The restaurant’s bank's computer contacts the customer’s bank's computer [1]
The card is checked if it is valid [1]
If valid the transaction continues [1]
If not valid the transaction is terminated [1]
An authorisation code is sent to the restaurant [1]
The price of the meal is deducted from the customer’s account [1]
Added to the restaurant’s account [1]

Exam Tip

 Make sure you read the question to see if it's a contactless payment or
involves Chip & PIN and reference this in your answer
 Don't forget that money isn't stored on the card, and that it provides a
link to the bank account it's linked to

Credit/Debit Card Transactions


 Characteristics and uses of credit/debit card transactions:
o Payment or withdrawal using a bank card
o Accepted by most merchants and service providers

Advantages and disadvantages of credit/debit card transactions

Advantages
Disadvantages

Convenient and easy


Risk of theft or loss
to use
Potential for
Widely accepted
overspending
Secure with fraud Transaction fees

70
protection
Cheques
 Characteristics and uses of cheques:
o A written order to a bank to pay a specified amount to a designated
person or entity
o Can be used for various payments, including bills, services, and
personal transactions

How do you deposit a cheque at an ATM?

 Customer is asked to enter their debit card in the ATM

 Customer’s bank computer is contacted

 The card details are searched in the bank database

 The card is checked to see if valid, in date or if it has been stolen

 The customer is asked to enter their PIN

 The PIN is compared to the PIN stored on the chip

 The customer is asked to deposit a cheque

 The system checks whether the cheque is valid

 The cheque is scanned by the ATM

 Amount is scanned

 The Bank account is checked for sufficient funds

 The image of the scan is saved

 The customer is asked to select the account to deposit money

 Money is deducted from the bank of the cheque

 Money is added to the account of the payee

 A receipt is sent to the printer at the ATM

Advantages and disadvantages of cheques

71
Advantages Disadvantages

Slow processing
Secure and traceable
time
No need for physical Not widely
cash accepted
Useful for large Risk of cheque
transactions bouncing
Online Banking
 Characteristics and uses of Internet banking:
o Online access to banking services via a secure website or app
o Allows for transfers, bill payments, account management, and more

Advantages and disadvantages of Internet banking

Advantages Disadvantages

Convenience and 24/7 access Security of transactions


Requires a reliable internet
Easy account management
connection
Reduced need for branch visits
More risk of fraud
(saving time and money)
Easier to make errors
Interest rates may be better (typing in the wrong
information)
Easier to shop around for the best Physical cash can't be
account deposited/withdrawn
Exam Tip

 Sometimes the question will be about advantages and disadvantages of going


to the bank rather than using online banking. Read the question carefully (you
can reverse the statements in the table above)

Computers in Medicine
Information Systems in Medicine
 Characteristics and uses of patient records:
o Digital records of a patient's medical history

72
o Contains personal information, diagnoses, treatments, and test results
o Used by healthcare professionals for making informed decisions about
patient care
 Characteristics and uses of pharmacy records:
o Records of medication dispensed by a pharmacy
o Contains patient information, medication details, dosages, and the
prescribing doctor
o Used by pharmacists to track medication history and ensure safe
dispensing

Healthcare settings may also use online booking systems for appointments

Healthcare professionals may also utilise expert systems to assist with a diagnosis

3D Printers in Medicine
There are various ways 3D printers can be used:

 Printing of prosthetics:
o Custom-made prosthetic limbs or body parts
o Can be tailored to a patient's specific needs
o Faster and more affordable than traditional methods
 Tissue engineering:
o 3D printing of living cells to create functional tissues
o Can be used to repair or replace damaged organs
o Potential to reduce the need for organ donations
 Artificial blood vessels:
o 3D printed blood vessels made of biodegradable materials
o Can be used in surgeries to replace damaged vessels
o Allows for improved blood flow and faster healing
 Customised medicines:
o 3D printed pills with precise doses and drug combinations
o Tailored to a patient's specific needs and conditions
o Potential to improve medication adherence and effectiveness

Computers in Retail
Point Of Sale (POS)
 Point of Sale (POS) terminals are a computerised system used at checkout
counters to process transactions and manage inventory
o Essential part of retail checkout counters
o Process transactions and calculate total amounts due
o Utilise barcode scanners, touch screens, and receipt printers

73
 Functions of POS terminals:
o Update stock files automatically
 Track inventory levels in real-time
 Prevent stock discrepancies and ensure accurate records
o Order new stock automatically
 Monitor inventory levels and reorder when stock is low
 Streamline supply chain management and minimise stockouts

 Electronic Funds Transfer at Point of Sale (EFTPOS) terminals:


o Enable customers to make payments using credit/debit cards
o Part of a secure transaction system
 Functions of EFTPOS terminals:
o Check the validity of cards
 Ensure cards are active and not expired
 Reduce the risk of fraud
o Use of chip and PIN
 Enhance security with two-factor authentication
 Require customers to enter a personal identification number
(PIN)
o Use of contactless cards
 Allow for faster transactions
 Enable customers to tap their card on the terminal
o Use of Near Field Communication (NFC) payment
 Facilitate payments through smartphones and other devices
 Increase convenience for customers
o Communication between supermarket computer and bank computer
 Share transaction details securely
 Enable instant payment processing and verification

Worked example

Modern supermarkets have automated stock control systems, which use data from
the checkouts.
Describe how food items can be ordered by an automated stock control system so
they are delivered before the stock in the supermarket runs out.

[4]

4 of:

Each item is scanned/bar code is read at the POS terminal [1]


Bar code is searched in the database [1]
The quantity of products is reduced [1]
The stock database is updated [1]
When the minimum stock number/level/reorder level is reached [1]
Reads re-order quantity [1]

74
Goods flagged as ordered [1]
The automated stock system sends a signal to the warehouse computer to order new
items [1]
The warehouse sends the items to the supermarket [1]
Re-order quantity is found in the database [1]
Flags removed [1]
The stock control system updates the stock levels in the stock control database with
the new stock [1]
Internet shopping
Internet shopping is the act of purchasing goods or services online through websites
or mobile applications

Characteristics of Internet Shopping

 Online stores accessible through web browsers


 Wide variety of products and services are available
 Convenient and often open 24/7

Advantages of Internet Shopping to the Customer

 Time-saving and convenient


o Shop from home or on the go
o Avoid queues and busy stores
 Greater product variety
o Access to the global market
o Compare products and prices easily
 Customisation options
o Personalise items or services
o Tailor purchases to individual preferences
 Potential cost savings
o Competitive pricing due to lower overheads
o Take advantage of online sales and promotions

Disadvantages of Internet Shopping to the Customer

 Security concerns
o Risk of fraud or identity theft
o Need to provide personal and financial information
 Limited physical interaction
o Can't touch or try products before purchasing
o This may lead to dissatisfaction or returns
 Delivery delays and fees
o Wait for items to be shipped and delivered
o Additional costs for shipping and handling

75
 Impersonal customer service
o Difficulty resolving issues or returning items
o Lack of face-to-face interaction with staff

Advantages of Internet Shopping to the Business

 Can target prices, products and services at specific groups based on buying
data

 Can update stock availability and prices more quickly than a physical store
through their website

 Cheaper to publicise special offers rather than mail shots

 International customer base

 Increased profits due to lower overheads (e.g. fewer staff)

Disadvantages of Internet Shopping to the Business

 Increased Competition
o Online shopping means businesses have to compete with a global
market, which can be more challenging than competing with local
businesses
 Digital Fraud and Security Concerns
o Online transactions expose businesses to potential cyber threats such
as hacking and fraud. Data breaches can result in financial loss and
damage to brand reputation
 Technical Issues and Downtime
o Website outages or technical glitches can prevent customers from
making purchases and negatively affect the user experience
 Costs of Delivery and Returns
o Online businesses often shoulder the cost of shipping products to
customers and also have to manage returns and refunds, which can be
costly
 Customer Trust
o Customers can't physically touch, feel, or try products before buying,
which can lead to uncertainty and a lack of trust
 Inventory Management
o Keeping accurate track of inventory can be complex, especially if a
company sells through multiple online channels
 Depersonalisation
o It can be harder to build relationships with customers and provide
personalised service when all interactions happen online
 Online Reviews

76
o Negative customer reviews can greatly impact the image of the
business, as they are visible to all potential customers
 Dependency on Internet Infrastructure
o Businesses need a stable and reliable internet connection to manage
their operations smoothly
 Logistical Challenges
o Managing and operating warehouses, packaging, and shipping can be
difficult and costly for smaller businesses
 Legal and Regulatory Compliance
o Companies selling online may have to comply with a multitude of laws
and regulations, which can vary by country
 Increased Customer Expectations
o The convenience of online shopping has led to increased customer
expectations for fast, free delivery, and excellent customer service

Expert Systems
Download PDF
Expert Systems
An Expert system is a computer program that uses artificial intelligence to replicate
the decision-making abilities of a human expert in a specific field.

Purpose of an Expert System

 Solve complex problems


o Expert systems are designed to handle complex problems that usually
require human expertise
 Enhance decision-making
o They assist in making informed decisions by providing accurate and
reliable recommendations based on the available data
 Save time and resources
o Expert systems can process vast amounts of data quickly, reducing the
time and effort required by human experts
 Consistency and accuracy
o They ensure consistent and accurate results by eliminating human
error and bias
 Knowledge preservation
o Expert systems store and preserve the knowledge of experts, ensuring
it is not lost when the expert retires or is unavailable

Uses of Expert Systems

 Mineral prospecting
o Analyse geological data

77
o Identify potential locations for mineral deposits
 Car engine fault diagnosis
o Determine issues within engine components
o Suggest repair options and maintenance schedules
 Medical diagnosis
o Analyse patient symptoms and medical history
o Suggest possible diagnoses and treatment plans
 Chess games
o Evaluate possible moves based on the game state
o Plan strategic moves to increase chances of winning
 Financial planning
o Evaluate investment options and risks
o Provide personalised financial advice
 Route scheduling for delivery vehicles
o Calculate optimal routes based on factors like distance, traffic, and time
constraints
o Reduce fuel consumption and improve efficiency
 Plant and animal identification
o Analyse physical characteristics and habitat data
o Identify species and provide relevant information
 Career recommendations
o Ask the user a series of questions / analyse existing qualifications
o Make recommendations on career choices

Worked example

Q. Expert systems are used by doctors.


a. Describe how an expert system can be used to diagnose illnesses.

[5]

5 of:

An Interactive user interface appears [1]


Questions are asked about the illness [1]
Yes and No type answers to the questions [1]
Answers lead to other questions [1]
The inference engine searches the knowledge base [2]
Using the rules base [1]
Probabilities/possibilities of diagnoses and treatments are displayed [1]
Displays the ways it achieved the solutions/conclusions / explanation [1]

b. Name two other applications of expert systems.

[2]

78
2 of:

Mineral prospecting [1]


Car engine fault diagnosis [1]
Chess games [1]
Tax queries [1]
Careers recommendations [1]
Components of an Expert System
Components of an Expert System

 User Interface:
o Allows users to interact with the expert system
o Provides a platform for inputting data and receiving recommendations
or solutions
o Designed for ease of use and accessibility
 Inference Engine:
o A core component of the expert system that performs logical reasoning
o Applies rules from the rules base to the data from the knowledge base
o Mimics human decision-making processes to generate conclusions
 Knowledge Base:
o Repository for domain-specific information, facts, and data
o Contains expertise gathered from human experts or other reliable
sources
o Essential for the inference engine to make accurate recommendations
 Rules Base:
o Stores logical rules and relationships governing the domain
o Guides the inference engine in applying reasoning to the data
o Rules can be modified or updated as new information becomes
available
 Explanation System:
o Provides transparency in the decision-making process
o Offers detailed explanations of the expert system's reasoning and
conclusions
o Enhances user trust and understanding of the system's
recommendations

How an Expert System is Used to Produce Possible Solutions

 Expert systems use the knowledge base and rules base to analyse input data
 The inference engine applies rules and logic to the input data
 The system generates potential solutions or recommendations based on the
applied rules
 The explanation system communicates the reasoning behind the suggested
solutions

79
Exam Tip

 This topic comes up frequently. Make sure you understand the operation of an
expert system. You need to be able to not only name the components but
explain how they interact or operate

Systems Life Cycle: Analysis


Download PDF
Systems Life Cycle: Analysis
The first stage is finding out about the current system. There are many ways to do
this and usually more than one method is used:

 Observation
o Characteristics: watching users interact with the system
o Uses: understanding how users interact with the current system
o Advantages: provides first-hand, unbiased information
o Disadvantages: can be time-consuming, may not reveal all issues
 Interviews
o Characteristics: structured or unstructured conversations with users
o Uses: gathering detailed information about user experiences
o Advantages: allows for in-depth exploration of issues
o Disadvantages: may be influenced by interviewee bias, time-consuming
 Questionnaires
o Characteristics: structured surveys with predetermined questions
o Uses: collecting data from a large number of users
o Advantages: allows for quantitative analysis, efficient data collection
o Disadvantages: limited by predetermined questions, may suffer from
low response rates
 Examination of existing documents
o Characteristics: reviewing system documentation, user guides, or
reports
o Uses: understanding the current system's design and any known
issues
o Advantages: provides insights into the system's history, can reveal
previously unknown issues
o Disadvantages: may be outdated or incomplete, time-consuming

Identifying Key Aspects of the Current System

 Inputs: data or information entered into the system


 Outputs: data or information generated by the system
 Processing: tasks performed by the system on the inputs to produce the
outputs

80
 Problems: issues that users face with the current system
 User requirements: what users need from the new system
 Information requirements: data or information the new system must process

Hardware and Software Selection

 Identify suitable hardware


o Consider system requirements, compatibility, and cost
o Justify choices based on user needs and system performance
 Identify suitable software
o Consider functionality, compatibility, and ease of use
o Justify choices based on user requirements and system efficiency

Exam Tip

 When justifying hardware and software choices, make sure to link your
decisions to the user and information requirements for the new system. This
demonstrates your understanding of the analysis stage of the Systems Life
Cycle

Worked example

Q.A small company makes toys and then delivers them to shops.
Throughout the day orders are received by the company from its customers.
The office workers in the finance department create and store an invoice for
each order. They are too busy to be disturbed by their work.
Delivery drivers receive copies of the invoices which they will pass on to their
customers. The drivers make a large number of deliveries per day and do not
return to the office.
A systems analyst will research the current system and suggest improvements
to be made.
For each type of employee identified above, describe the most suitable method
of collecting information from them, giving a reason for your choice.

[4]

Office workers:

Observation of the processes taking place [1]

Looking at existing paperwork [1]

Reason:

81
1 of:

Enables the systems analyst to see the whole system [1]


There are too many workers to interview them all [1]
Questionnaires/interviews would stop them from working on their tasks [1]

Can see how the files are stored/processes undertaken [1]


It allows information to be obtained that cannot be obtained in other ways [1]
enables necessary storage, and computer equipment to be identified [1]
If they are observed, then they may change the way they work [1]
They are too busy to be interviewed [1]

Delivery drivers:

Questionnaires could be handed out [1]

Reason:

1 of:

They can complete them in their own time/at their leisure [1]
Questionnaires tend to be more accurate [1]
The data can be collated more quickly as everyone can complete at the [1]
same time rather than interviewing which is one after the other [1]
Individuals remain anonymous therefore they will be more truthful/reliable [1]
Easier to analyse [1]

Systems Life Cycle: Design


Download PDF
Systems Life Cycle: Design
File/Data Structures

 Field length: number of characters allowed in a field


 Field name: an identifier for the field in the data structure
 Data type: specifies the kind of data that can be stored in a field, e.g. text,
numbers, dates
 Coding of data: using codes to represent data, e.g. M for male, F for female

Input Formats

 Data capture forms: designed to collect data from users in a structured format

82
 Consider a user-friendly layout, clear instructions, and appropriate data fields

Output Formats

 Screen layouts: how information is presented to users on a screen


 Report layouts: how information is organised in a printed or digital report
 Consider readability, visual appeal, and efficient use of space

Validation Routines

 Range check: ensures data is within a specified range of values


 Character check: ensures data contains only allowed characters
 Length check: ensures data is of a specified length
 Type check: ensures data is of the correct data type
 Format check: ensures data conforms to a specific format
 Presence check: ensures data is present and not left blank
 Check digit: a digit added to a number to verify its accuracy

Exam Tip

 In the design stage of the Systems Life Cycle, focus on creating clear, user-
friendly input formats and output formats. Additionally, make sure to
implement appropriate validation routines to ensure data accuracy and
completeness.

Worked example

Carlos is designing a new computer system to replace an existing system. Tick four
items which will need to be designed.

[4]

Tick
Inputs to the current system.
Data capture forms.
Report layouts.
Limitations of the system.
Observation methods.
Improvements to the system.
User and information requirements.
Validation routines.
Problems with the current system.

83
File structure.
Tick
Inputs to the current system.
Data capture forms. χ
Report layouts. χ
Limitations of the system.
Observation methods.
Improvements to the system.
User and information requirements.
Validation routines. χ
Problems with the current system.
File structure. χ

Systems Life Cycle: Testing


Download PDF
Systems Life Cycle: Testing
Why do we test?

 Ensures the system works as intended before implementation


 Identifies and fixes errors, improving system reliability and performance

Test Designs

 Test data structures, file structures, input formats, output formats, and
validation routines
 Ensure all components function correctly and interact seamlessly

Test Strategies

 Test each module: verify individual components function as intended


 Test each function: ensure all features work correctly
 Test the whole system: confirm overall system performance and integration

Test Plan

 Test data: specific data used for testing purposes


 Expected outcomes: predicted results based on test data
 Actual outcomes: results obtained from testing
 Remedial action: steps taken to fix identified issues

84
Test Data Types

 Normal data: valid and expected data values within the range of acceptability
 Abnormal data: invalid or unexpected data values. This can either be:
o Data outside the range of acceptability or
o Data that is the wrong data type
 Extreme data: values at the limits of acceptability

What is live data?

 Data that has been used with the current system


 Therefore the results are known

Worked example

Q. The European Space Agency (ESA) is building a new space telescope to


orbit the Earth and search for distant galaxies. The ESA is using computer
controlled robots to build the lens of the telescope. A new computer system
will operate the space telescope; the new computer system is made up of
several modules.
Describe how the new computer system is to be tested before it is fully
operational.

[4]

4 of:

Each module has to be tested independently to ensure it functions correctly [1]


Modules need to be tested together [1]
Data needs to be transferred from module to module to check for data clashes [1]
Errors need to be noted and corrections made [1]
Then tested again [1]
The system as a whole needs to be fully tested under controlled conditions [1]

Systems Life Cycle:


Implementation
Download PDF
Methods of Implementation
Direct changeover

 The old system is replaced by the new system immediately


 Used when quick implementation is necessary

85
Parallel running

 Both old and new systems run simultaneously for a period before the old
system is phased out
 Used when a smooth transition with minimal risk is required

Pilot running

 The new system is implemented in a small, controlled environment before full-


scale implementation
 Used when testing the new system in a real-world setting

Phased implementation

 The new system is implemented in stages, with each stage replacing a part of
the old system
 Used when a gradual transition is preferred to minimise disruption

IMPLEMENTATION
ADVANTAGES DISADVANTAGES
METHOD

High risk of failure, no fallback,


Fast implementation, cost-effective
Direct changeover users can't be trained on the new
as only one system is in operation
system, and no backup of the system

Lower risk, easy comparison of


Parallel running Time-consuming, resource-intensive
systems

Low risk as only trialled in one Slower implementation, potential


department/centre/branch, allows for inconsistencies, confusion as there
Pilot running fine-tuning, staff have time to train are 2 systems in use, no backup for
with the new system, few errors as the department/centre/branch using
it's fully tested the new system

Takes longer, and potential


Phased implementation Reduced risk, easier to manage
compatibility issues

Exam Tip

 When discussing implementation methods in the Systems Life Cycle, make


sure to consider the specific context of the system being implemented.

86
Choose the method that best fits the organisation's needs, weighing up factors
such as risk, time, and resources
 Don't mix up pilot implementation with prototyping or direct implementation
 These are different ways in which one new system could be implemented
using two different methods
 You may get a question which asks you to compare 2 methods - only write
about these 2 in the question and compare them, don't just describe them

Worked example

Tick (✓) the most appropriate method of implementation to match the statements
below.

Direct Parallel Pilot


All of the benefits are immediate.
If the new system fails the whole of the old system is still operational.
This is the cheapest implementation method.
The system is implemented in one branch of the company.
[4]

Direct Parallel Pilot


All of the benefits are immediate. χ
If the new system fails the whole of the old system is still operational. χ
This is the cheapest implementation method. χ
The system is implemented in one branch of the company. χ

Systems Life Cycle:


Documentation
Download PDF
Technical Documentation
 Characteristics: Detailed information on the system's inner workings and
programming for developers and IT staff
 Uses & Purpose: To maintain, repair, and update the system with
improvements
 Components:
o Purpose of the system/program: Explanation of the system's intended
function and goals
o Limitations: Known constraints or issues with the system
o Program listing: The code or scripts used in the system

87
o Program language: The programming language used to develop the
system
o Program flowcharts/algorithms: Visual representations or descriptions
of the system's logic and processes
o System flowcharts: Visual representations of the interactions between
system components
o Hardware & software requirements: Necessary equipment and software
to run the system
o File structures: Organisation and layout of the system's files and data
o List of variables: Collection of variables used within the system,
including their names and purposes
o Input format: Structure and format for entering data into the system
o Output format: Structure and format for presenting data generated by
the system
o Sample runs/test runs: Examples of system operation, including input
and expected output
o Validation routines: Techniques used to check and confirm the
accuracy of data entered into the system

Worked example

Q. Following the implementation of the system, technical documentation needs


to be written.
Identify three components of technical documentation which are not found in
the user documentation.

[3]

3 of:

program listing [1]


program language [1]
program flowcharts/algorithms [1]
system flowcharts [1]
file structures [1]
list of variables [1]
test runs [1]
validation routines [1]
User Documentation
 Characteristics: Instructions and guidance for end-users on how to operate the
system
 Uses & Purpose: To help users effectively use the system and overcome
problems
 Components:

88
o Purpose of the system: Explanation of the system's intended function
and goals
o Limitations: Known constraints or issues with the system
o Hardware & software requirements: Necessary equipment and software
to run the system
o Loading/running/installing software: Instructions for setting up the
system on user devices
o Saving files: Procedures for storing data within the system
o Printing data: Steps to produce hard copies of system data
o Adding records: Instructions for creating new entries in the system
o Deleting/editing records: Guidelines for modifying or removing existing
entries in the system
o Input format: Structure and format for entering data into the system
o Output format: Structure and format for presenting data generated by
the system
o Sample runs: Examples of system operation, including input and
expected output
o Error messages: Explanations of system warnings and error
notifications
o Error handling: Steps to resolve issues and errors within the system
o Troubleshooting guide/helpline: Assistance for diagnosing and
addressing common problems
o Frequently asked questions: Answers to common user inquiries
o Glossary of terms: Definitions of key terms and concepts related to the
system

Exam Tip

 Remember that technical and user documentation serve different purposes


and audiences
 Technical documentation is meant for developers and IT staff who maintain
and update the system, while user documentation is for end-users who need
guidance on using the system effectively
 Ensure you understand the different components of each type and their
purposes

Systems Life Cycle: Evaluation


Download PDF
Systems Life Cycle: Evaluation
Assess the efficiency of the solution:

89
 Evaluate the system's performance in terms of resource usage, time, and
cost. Consider whether the system is operating optimally or if improvements
could be made to its efficiency
o Provide examples of specific aspects that contribute to the system's
efficiency
o Identify areas that may be consuming excessive resources or time, and
suggest ways to optimise them
 Questions to ask:
o Does it operate quicker than the previous system?

o Does it operate by reducing staff time in making bookings?


o Does it operate by reducing staff costs?

Evaluate the ease of use

 Examine how user-friendly and accessible the solution is for its intended
audience. Assess whether the system is easy to learn and use, and if users
can accomplish their tasks without difficulty
o Describe the user interface and how it facilitates interaction with the
system
o Mention any feedback from users regarding their experience with the
system, and address any issues they encountered
 Questions to ask:
o Are all the users able to use the system and make bookings easily?

o Are all the users able to change and cancel bookings easily?

o Can all staff understand how to use the system with minimal training?

Determine the appropriateness of the solution:

 Compare the implemented solution with the original task requirements and
evaluate how well it meets the intended purpose
o Outline the initial objectives of the system and discuss how the solution
addresses each one
o Highlight any requirements that may not have been fully met and
discuss possible reasons for this
 Questions to ask:
o Is the system suitable for each of the departments?

o Does it meet the needs of the customers?

o Does it meet the needs of the staff?

o Does the solution match the original requirements?

90
Gather and analyse user feedback:

 Collect users' responses to the results of testing the system. Their feedback
can provide insights into potential issues and improvements, and help
determine overall user satisfaction
o Summarise the testing process, including test data, expected
outcomes, and actual outcomes
o Discuss users' reactions to the system, addressing any concerns or
suggestions they may have

Identify limitations and propose improvements:

 Based on the analysis of efficiency, ease of use, appropriateness, and user


feedback, identify any limitations in the system and suggest necessary
improvements
o List the limitations and provide explanations for each one
o Recommend specific changes or enhancements that could address
these limitations and improve the system

Worked example

Tick three evaluation strategies that need to be carried out following the
implementation of the new system.

[3]

Tick
Observe users operating the old system.
Compare the final solution with the original requirements.
Design the report layout.
Check user documentation to see if it is correct.
Interview users to gather responses about how well the new
system works.
Test the system works correctly.
Identify any necessary improvements that need to be made.
Design error handling.
Tick
Observe users operating the old system.
Compare the final solution with the original requirements. χ
Design the report layout.
Check user documentation to see if it is correct.

91
Interview users to gather responses about how well the new
χ
system works.
Test the system works correctly.
Identify any necessary improvements that need to be made. χ
Design error handling.

Safety Issues
Download PDF
Safety Issues
Electrocution

 ICT devices require electrical power to charge or run


 The electrical device can cause electrocution
 Electrocution is caused by the electric current moving through your body, it
can cause severe injury or death

Electrocution causes and prevention strategies

CAUSES PREVENTION STRATEGIES

Spilling drinks near electrical


Keep liquids away from electrical equipment
equipment
Ensure that cables are properly insulated and protected

Use non-conductive materials where possible


Touching live cables
Ensure that electrical equipment is turned
off and unplugged before cleaning or maintenance

Use circuit breakers or fuses to prevent electrical overload

Fire:

 ICT devices require electricity to charge or run


 Too many devices using a single socket can cause the plug socket
to overload
 Heat is generated by too much electricity, causing the wiring to degrade and
ignite a fire

92
Fire causes and prevention strategies

CAUSES PREVENTION STRATEGIES

Use surge protectors to prevent electrical overload

Ensure enough plug sockets in the room


Sockets
being overloaded
Don’t plug too many devices into the same plug socket

Don’t leave devices plugged in and unattended


Ensure that equipment is properly ventilated and
not obstructed

Keep flammable materials away from heat sources

Regularly check equipment for signs of wear or damage


Equipment overheating
Use fire extinguishers in case of emergencies

Turn off or unplug devices when away from the location

Do not cover any air vents on devices

Tripping over trailing cables:

 Devices can be plugged in using cables, cables that are protruding can
cause an accident
 You can trip over a cable left out in a location
 Body damage can occur during a fall, for example, breaking bones, ligament
damage, bruising, sprains etc depending on the area fell on

Tripping over trailing cables causes and prevention strategies

CAUSES PREVENTION STRATEGIES

Cables not Use cable ties or clips to secure cables


properly secured or organised
Keep cables away from areas where people are walking

93
Secure cables where you can, like under desks to stop
protruding into open areas

Use cable covers to protect cables and prevent tripping


hazards

Regularly inspect cables for signs of wear or damage

Where possible use wireless devices to reduce cables

Heavy equipment falling and injuring people:

 Devices have varying levels of weight and if a device falls on you it could
cause injury
 Any device should be placed in a secure location, like a PC on a strong desk
and not near the edge

Heavy equipment falling and injuring people causes and prevention strategies

CAUSES PREVENTION STRATEGIES

Ensure that equipment is properly secured and stable


Improperly secured
equipment
Regularly check the stability of locations containing devices
Keep equipment away from edges and other potential hazards
Equipment not placed on
stable surfaces Regularly inspect equipment and locations containing devices
for signs of wear or damage
Worked example

Q.Using computers can lead to several physical safety issues.

Describe four of these types of issues.

[4]

Electrocution, caused by touching bare wires / allowing food and drink to spill liquids
onto computers [1]

Falling objects can cause injury [1]

Tripping over loose cables can cause injury [1]

94
The fire is caused by overloading power sockets / overheating computers [1]

Data Protection
Data Protection
The Data Protection Act (DPA) controls the collection, storage and processing of
personal data.

 In the UK, European Union’s General Data Protection Regulation (GDPR)


 Protects personal data whether stored on paper or a computer system

Principles of the Data Protection Act

 Data must be processed lawfully, fairly, and transparently, with


clear consent from the individual
 Data should only be collected for specific, explicit, and legitimate purposes
 Organisations should only collect and retain the minimum amount of
personal data necessary for their stated purpose.
 Data should be accurate and kept up-to-date, and reasonable steps must
be taken to rectify or erase inaccurate information
 Personal data should not be kept for longer than necessary, and it should
be securely deleted when no longer needed
 Organisations must protect personal data against unauthorised or
unlawful processing, accidental loss, destruction, or damage

Why is Data Protection Legislation Required?

 Protecting Individual Rights: Data protection legislation safeguards


individuals' right to privacy and control over their personal information
 Preventing Misuse of Personal Data: It helps prevent unauthorised access,
identity theft, fraud, and other forms of data misuse
 Promoting Trust: Data protection laws build trust between individuals and
organisations by ensuring their personal information is handled responsibly
 Encouraging Responsible Data Handling: Legislation promotes responsible
data collection, storage, and processing practices among organisations
 Enabling Data Subject Rights: Legislation grants individuals rights such as
access to their data, right to rectification, erasure, and objection to processing

Personal Data
Download PDF
Personal Data

95
Personal and sensitive data refers to information that can be used to identify an
individual, such as their personal name, address, date of birth, personal images,
and medical history.

Personal data:

 Personal name: Refers to the full name of an individual, including their first
name and last name.
 Address: The physical location where an individual lives, including their
house number, street name, city, and postal code.
 Date of birth: The specific day, month, and year when an individual was
born.
 Gender: the individual's identity relating to male, female, don’t know, prefer
not to say
 Personal images like a photograph in school uniform: An image of an
individual wearing their school uniform, which can be used to identify and
locate them.
 Payment details: bank card details used for purchasing items or bank
details to access online banking
 Passwords: the combination of letters, numbers and symbols used to
access accounts that are held by the individual

Sensitive data:

 Medical record/history: Information related to an individual's health,


including any past illnesses, medical conditions, or treatments they have
received. This can include any genetic or DNA information about genetic
characteristics
 Political views: the individual's opinions on political matters/issues and
how they are being handled by the current government. This can
include memberships in political parties
 Ethnic/racial origin: the ethnic or cultural origins of the individual's
ancestors
 Criminal activities: any past or current criminal offences

 Religion/philosophical beliefs

 Membership of a trade union: made up of workers to protect and advance


the interests of all workers in the workplace

 Sexual orientation: defining who you are attracted to, the opposite gender,
the same gender, or to both or more than one gender

 Biometric data: body measurements used to identify us uniquely


like fingerprints or facial features

96
Why should personal data be protected?

 Inappropriate disclosure of personal data can lead to privacy breaches,


identity theft, or misuse of the information
 Personal data could be sold to third party companies
 Individuals could be held to ransom over personal data gathered

 Information gathered could be used to commit a physical crime

How to avoid data being inappropriately disclosed:

 Personal data must be kept confidential and protected through privacy


settings on websites such as social media or strong passwords on
websites where personal data is held or used
 Access to personal data should be limited to authorised individuals
 Think before you post - consider what information could be gathered from
your image or content
 Check website details about the collection, storage, and use of personal
data
 Only access websites where personal data is used or viewed when on
a secure, encrypted connection

Worked example

Some confidential personal data can be classified as sensitive data.

Name three items of personal data that could also be sensitive.

[3]

3 of:

Ethnic/racial origin [1]

Religion/philosophical beliefs [1]

Political views/opinions [1]

Membership of a political party [1]

Membership of a trade union [1]

Sexual orientation [1]

Criminal record [1]

97
Health/medical record [1]

Genetic data/DNA [1]

Biometric data [1]

E-safety
Download PDF
E-safety
 E-safety is about knowing about and using the internet
safely and responsibly
 It refers to when an individual is using the internet, email, social
media, online gaming
 E-safety refers to the individual knowing how to protect themselves
from potential dangers and threats

The need for e-safety


 Protects personal information
o awareness that personal information should not be shared freely

 Prevents cyberbullying
o awareness of how to act online and how to avoid falling victim, creating
a safe and respectful online environment.

 Guards against online scams


o identify and avoid online scams, phishing attempts, and fraudulent
websites that may try to trick them into sharing personal or financial
information.

 Ensures digital reputation


o mindful of online behaviour and interactions, protecting your digital
reputation, which can have long-term consequences in personal and
professional lives.

 Promotes privacy and control


o have control over privacy settings on social media platforms, allowing a
limit to who can access/view personal information and posts.

 Prevents exposure to inappropriate content


o avoid encountering explicit or harmful content online, reducing the risk
of exposure to inappropriate material or online predators.

98
 Secures online gaming experiences
o engage in online gaming responsibly, avoiding sharing personal details
and maintaining respectful behaviour towards other players.

 Guards against malware and viruses


o protecting devices from malware, viruses, and other online threats,
preventing data loss, privacy breaches, or device damage.

 Promotes responsible digital citizenship


o develop responsible online behaviours, promoting respectful conduct
while interacting with others on the internet.

 Supports overall well-being


o maintain a healthy balance between online and offline lives, reducing
the risk of addiction, mental health issues, or negative impacts on
relationships and self-esteem.

Advice
The Internet:

 Use trusted websites recommended by teachers or reputable sources


 Utilise search engines that only allow access to age-appropriate
websites and use filters to ensure inappropriate content is not seen
 Never reveal personal information

Email:

 Be aware of the potential


dangers of opening or replying to emails from unknown people,
including attachments, potential dangers include phishing, spam
 Ensure you know who the email is for when considering sending personal
data or images via email, only with people you know and not with
identifiable content like school photos

Social media:

 Know how to block and report people who send content or messages that
are unwanted
 Know where the privacy settings are to reduce the number of people who
can see your posts or images
 Be aware of the potential dangers associated with meeting online contacts
face to face, do not meet anyone you do not know, if you do, take an adult
and meet publicly
 Do not distribute of inappropriate images and inappropriate language

99
 Respect the confidentiality of personal data belonging to other people
 Only accept friend requests from people you know
 Parents should be aware of what you are doing online, discuss what you
are doing online
 Do not post images or details that can be used to locate you

Online gaming:

 Do not use real names as usernames


 Never share personal or financial details with other players
 Know how to block and report players for inappropriate messages or
comments

Worked example

Q. A student uses social media to keep in contact with other people.

Describe four strategies that the student could use to stay safe when using
social media to communicate with others.

[4]

4 of:

Don’t give out other people’s personal information such as address or phone
number [1]

Don’t send inappropriate images to anyone [1]

Don’t open/click on suspicious links/adverts on social media [1]

Don’t become online ‘friends’ with people you do not know//don’t contact/chat with
people you do not know [1]

Never arrange to meet someone in person who you only met online [1]

If anything you see or read online worries you, you should tell someone about it/block
them [1]

Use appropriate language [1]

Set security so only friends can contact you [1]

100
Threats to Data
Download PDF
Threats to Data
Threats

 Hacking: Unauthorised access to computer systems or networks to


gain control, steal information, or cause damage
 Phishing: Deceptive emails or messages that appear to be from trusted
sources to trick individuals into revealing personal data
 Pharming: Manipulation of DNS (Domain Name System) to redirect users to
fraudulent websites, often for the purpose of stealing personal data
 Smishing: Phishing attacks carried out through SMS or text messages
 Vishing: Phishing attacks carried out through voice calls or VoIP (Voice
over Internet Protocol) systems
 Viruses and malware: Malicious software designed to disrupt, damage,
or gain unauthorised access to computer systems or networks
 Card fraud: Unauthorised use of credit or debit card information
for fraudulent purposes

Protection from Hacking

 Implement strong and unique passwords for accounts and regularly


change them
 Enable two-factor authentication for additional security
 Regularly update software and operating systems to patch security
vulnerabilities
 Use firewalls and antivirus software to detect and prevent unauthorised
access
 Regularly backup data to ensure its availability and protection against
potential data loss

Protection from phishing, pharming, smishing, and vishing attacks

 Being cautious of unsolicited emails, messages, or calls requesting


personal or sensitive information
 Verifying the authenticity of websites by checking for secure
connections (HTTPS) and looking for trust indicators, such as SSL
certificates
 Avoiding clicking on suspicious links or downloading
attachments from unknown sources
 If you are unsure, end communication and establish contact with
company or contact to check legitimacy

101
Protection from viruses and malware

 Install antivirus software and keep it up to date


 Download files only from trusted sources and scan them for
viruses before opening or executing them
 Do not visit suspicious websites or click on pop-up ads
 Regularly update software, including web browsers and plugins, to patch
security vulnerabilities

Protection from card fraud

 Shielding PIN entry at ATMs or payment terminals to prevent shoulder


surfing
 Being cautious when using payment cards online, ensuring
secure and trusted websites are used
 Regularly monitoring bank statements and reporting any suspicious
transactions
 Using secure payment methods, such as chip and PIN or contactless
payments, where available
 Being aware of potential skimming devices on ATMs and payment
terminals and reporting any suspicious activity

Worked example

Data stored on a computer system is at risk of being hacked.

a. Explain what is meant by the term hacking. Include in your answer two
examples of the effects this can have on the computer system.

[3]

Gaining unauthorised access to a computer system [1]

2 of:

Examples

Can lead to the identity theft of data [1]

Can lead to the misuse of/access to personal data [1]

Data can be deleted [1]

Data can be changed [1]

Data can be corrupted [1]

102
Place malicious files/software [1]

b. Describe three measures that could be taken to protect the data from being
hacked.

[3]

3 of:

Use of firewalls to block unauthorised computer systems [1]

Use of passwords [1]

Use of intrusion detection software/anti-spyware [1]

Use two-factor authentication [1]

Switch off WiFi/computer when not in use [1]

Protection of Data
Download PDF
Protection of Data
Biometrics

 The use of unique physical or behavioural characteristics of individuals,


such as fingerprints, facial recognition, or iris scans, for authentication and
access control
 Biometric data provides a more secure method of identification as it
is difficult to forge or replicate

Advantages and disadvantages of Biometrics

ADVANTAGES DISADVANTAGES

 Skin damage can stop identification


 Harder to crack
 Facial features can change over time
 Easier to use for
 Some biometrics are more expensive to set up
individual
than others
 High accuracy
 Voice recognition can be affected by illness

103
Digital certificate

 An electronic document that verifies the authenticity and integrity of


a website
 The purpose of a digital certificate is to establish
trust between parties and ensure secure communication
 Contents of a digital certificate typically include the entity's public
key, identification information, and the digital signature of a trusted third
party

Secure Socket Layer (SSL)

 A protocol that establishes an encrypted link between a server and a client


computer
 SSL ensures that data transmitted between the server and client remain
confidential and cannot be intercepted or adjusted by unauthorised
individuals
 Identified on a website by the S at the end of HTTP

Encryption

 The process of converting data into a form that is unreadable without


a decryption key
 Encryption is used to protect data on hard disks, email communications,
cloud storage, and secure websites (HTTPS)
 It ensures that even if data is accessed by unauthorised individuals,
it cannot be understood without a decryption key

Firewall

 A network security device that monitors and controls


incoming and outgoing network traffic
 The purpose of a firewall is to create a barrier between an internal
network and external networks, filtering traffic based on predefined rules
 It helps prevent unauthorised access, malware, and other network threats

Advantages and disadvantages of Firewalls

ADVANTAGES DISADVANTAGES

 Stops attacks from  Can affect the operation of the computer and some
device uploads
 Stops fraudulent sites  To upload some files, the firewall may need to be
attacking the device switched off, leaving the computer open to attacks

104
 Can stop legitimate software from running

Two-factor authentication (2FA)

 A security measure that requires users to provide two separate


forms of identification to verify their identity
 The purpose of 2FA is to add an extra layer of security beyond just a
username and password
 It usually involves a combination of something the user knows
(password), something the user has (smartphone or token), or something
the user is (biometric data)

User ID and password

 A common method of authentication that involves a unique identifier (user


ID) and a secret code (password)
 User ID and password are used to increase the security of data by allowing
access only to authorised individuals
 Strong passwords and regular password changes are important to
maintain security
 It is recommended to use a combination of uppercase and lowercase
letters, numbers, and special characters in passwords

Advantages and disadvantages of Passwords

ADVANTAGES DISADVANTAGES

 Passwords too complex can be harder to


 Strong passwords are difficult to crack
remember
 Regularly changing passwords increases
 Too many passwords are hard to remember
the security
 Harder to choose unique passwords if
 Using a range of passwords over the
regularly updating
system will stop or slow access to the full
 Harder to remember if regularly updating
system
 Hackers can break most passwords

Worked example

The data stored on the computer system needs to be protected from unauthorised
access.

Discuss the effectiveness of different methods of increasing the security of this data.

105
[8]

8 of:

Factors increasing effectiveness

Strong passwords are difficult to crack [1]

Biometric passwords are harder to crack [1]

Regularly changing passwords increases security [1]

Use of two-factor authentication [1]

Using different passwords for parts of the computer system makes it more difficult to
gain access to the full system [1]

A firewall required to stop attacks from computers [1]

A firewall stops fraudulent sites from attacking the computer [1]

Anti-spyware stops passwords from being seen when typed in [1]

Factors reducing effectiveness

Too complex a password can be easily forgotten [1]

Passworded files may not be backed up [1]

Using several different passwords can become cumbersome [1]

Regularly changing passwords means that passwords may be forgotten [1]

May be difficult to choose a unique password if it is changed every few weeks [1]

Passwords may become easier to guess if regularly changed [1]

Hackers can breach most passwords [1]

The firewall can affect the operation of the computer and stop some uploads [1]

The firewall may need to be shut down at times to upload files therefore making the
computer unsafe [1]

Some legitimate software can be blocked by the firewall [1]

106
To gain full marks both sides of the discussion are needed

Target Audience
Target Audience
Developing ICT Solutions

 To build effective ICT solutions, the first step is to identify and understand the
needs of the intended audience. These needs can be functional, like
processing information or aesthetic, like a visually appealing interface
 After identifying the needs, select the appropriate technology and tools to
create a solution. This choice depends on factors like the complexity of the
task, the budget available, and the technical expertise of the users
 An essential aspect to remember while designing ICT solutions is to ensure
that they are user-friendly. This means that they should be intuitive to use,
require minimal training, and have easy-to-understand instructions
 Additionally, ICT solutions should be accessible to all users, including those
with disabilities. This could involve adding features like voice commands, large
text options, or compatibility with assistive devices
 Once the solution is created, it is crucial to test it to ensure it functions as
expected and fulfils the users' needs effectively

Audience Needs Analysis in ICT

 Understanding the audience is crucial in ICT solution design. The analysis


should consider factors such as the age, technical skills, and background of
the audience, which can affect their ability to use the solution
 The solution designer should also understand the type of information that the
audience needs. This can guide the design of the information architecture and
the data processing features
 How the audience accesses and uses the information also impacts the design.
For example, if the audience mostly accesses the solution via mobile devices,
the solution should be mobile-friendly
 Lastly, the designer should consider any special needs of the audience, like
visual or hearing impairments. The solution should be designed to
accommodate these needs, ensuring inclusivity

Copyright
107
Copyright
Why do we need Copyright?

 Copyright legislation is essential to protect the rights of creators and


developers
 It prevents the unauthorised use, duplication, or distribution of software,
known as software piracy
 It ensures developers are rewarded for their work, encouraging further
innovation and development

Principles of Copyright in Computer Software

 Copyright law prohibits the unauthorised copying, distribution, or modification


of software
 It also includes the End-User Licence Agreement (EULA), which outlines what
the software can and cannot be used for
 Violations of these principles, such as software piracy, can lead to legal
consequences

Preventing Software Copyright Violations

 Software producers use various methods to protect their copyright, such as


Digital Rights Management (DRM)
 DRM involves technologies or systems that control the use, modification, and
distribution of copyrighted works
 Other methods include product activation, where software requires a unique
code to be fully operational
 Automatic updates can also serve as a form of copyright protection, as pirated
software often can't receive these updates, making it less functional or secure
over time

The World Wide Web & Web


Pages
Download PDF
What is the World Wide Web
The Internet and the world wide web are often used interchangeably, but they are not
the same thing.

The Internet

108
 The Internet refers to the global network of computers and other electronic
devices connected through a system of routers and servers
 It is the infrastructure that allows us to send and receive information, including
email, instant messaging, and file transfers
 It also provides access to other services such as online gaming, video
streaming, and cloud computing

The World Wide Web

 The world wide web, or simply the Web, is a collection of websites and web
pages that are accessed using the internet
 It was created in 1989 by Tim Berners-Lee, who envisioned it as a way to
share and access information on a global scale
 The web consists of interconnected documents and multimedia files that are
stored on web servers around the world
 Web pages are accessed using a web browser, which communicates with a
web server to retrieve and display the content
 It is used for browsing web pages, sending emails, social networking, online
shopping, and much more
 Advantages include ease of communication, access to information, and online
services
 Disadvantages include privacy concerns, cybercrime, and misinformation

What can I find online?

 An intranet is a private network within an organisation, while an extranet is an


intranet that is partially accessible to authorised outsiders
 Blogs, forums, wikis, and social networks are types of web pages used for
sharing information and social interaction

Blogs

 A blog (short for weblog) is a website or part of a website that is updated


regularly with content, often written in an informal or conversational style like a
journal
 They are usually presented in reverse chronological order
 They are usually managed by individuals or small groups
 They allow for reader comments, facilitating some level of discussion
 Blogs often focus on specific topics, such as food, travel, fashion, technology,
or personal experiences
 They can also serve as a platform for sharing opinions or insights

Forums

109
 A forum is an online discussion site where people can hold conversations in
the form of posted messages
 They are often organised around specific topics or interests, and divided into
categories known as threads
 Unlike blogs, forums are primarily focused on peer-to-peer interaction
 They may require users to create an account before posting
 Forums can be moderated or unmoderated

Wikis

 A wiki is a type of website that allows users to add, remove, or edit content
 It is designed to facilitate collaboration and knowledge sharing from many
people
 It holds information on many topics which can be searched
 Posts are not in chronological order
 The structure is determined by the content or its users
 The most famous wiki is Wikipedia, an online encyclopaedia
 Changes can be tracked and reverted if necessary, and the content is usually
written in a neutral style

Social Networking

 Social networking sites are platforms where users can connect with others
and share content
 They include platforms like Facebook, Twitter, Instagram, and LinkedIn
 Social networking platforms usually require users to create a profile and allow
them to share text, images, videos, and links
 They facilitate interaction, collaboration, and information sharing on a
large scale
 Privacy settings allow users to control who can see their content

Worked example

Tick whether the following refer to moderated or un-moderated forums

[2]

Moderated Un-moderated
All posts are held in a queue.
Posts are not policed.
This forum reduces the chance of offensive messages.
This forum stops several postings on the same topic.

110
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
1 correct – 0 marks

Moderated Un-moderated
All posts are held in a queue. χ
Posts are not policed. χ
This forum reduces the chance of offensive messages. χ
This forum stops several postings on the same topic. χ

The Functionality of the Internet

 Internet Service Providers (ISPs) provide services for accessing and using the
Internet
 A Uniform Resource Locator (URL) is the address of a web page on the
WWW

What is a URL?

 The URL is a text-based address that identifies the location of a resource on


the internet
 It is the address of a web page, image, video, or any other resource available
on the internet

 A URL can contain three main components:


o Protocol
o Domain name
o Web page / file name
 The protocol is the communication protocol used to transfer data between the
client and the server
o E.g. HTTP, HTTPS, FTP, and others
 The domain name is the name of the server where the resource is located
o It can be a name or an IP address
 The web page / file name is the location of the file or resource on the server
o It can contain the name of the file or directory where the resource is
located
 A URL looks like this:
o protocol://domain/path
o E.g. https://www.example.com/index.html is a URL that consists of the
HTTPS protocol, the domain name "www.example.com", and the file
name is "/index.html".

Risks of Using the Internet

111
 Inappropriate and criminal material: The internet can expose users to harmful
or illegal content
 Data restriction: Parental, educational, and ISP controls can limit access to
certain information or websites

 A web browser is a software application used to locate, retrieve, and display


content on the WWW, including web pages, images, video, and other files
 A hyperlink is a word/phrase/image which references data that the reader can
follow by clicking or tapping, usually taking you to another web page

Worked example

Q. HotHouse Design is a large design company. It has recently created a new


web address for its design portfolios. The web address is:
https://www.hothouse-design.co.uk/portfolios
a. Describe the following parts of the web address.

[4]

https://

1 of:

This is the hypertext transfer protocol secure [1]


Set of rules/protocol [1]

hothouse-design

this shows the domain name that the company have purchased [1]

.uk

The company/domain is registered in the UK [1]

/portfolios

The folder in which the work is stored on Hothouse’s server [1]

b. Hyperlinks are widely used in web pages.


Explain what is meant by a hyperlink.

[2]

Word/phrase/image [1]
When clicking links to another document/page/website/top or bottom of the page [1]

112
Search Engines
Search Engines
What are Search Engines?

 Search engines are tools that locate and display web pages related to the
search terms entered by the user
 They are essential for navigating the vast amount of information on the
internet
 They index millions of web pages and use algorithms to rank the relevance of
each page to the search terms

Speed of Searching

 Search engines can scan through billions of web pages in a fraction of a


second to find matches to your search query
 The speed is affected by your internet connection and the efficiency of the
search engine’s algorithms

Amount of Information

 Search engines can provide an overwhelming amount of information, making


it crucial to use specific and relevant search terms
 Using quotation marks for exact phrases, plus signs for mandatory terms, or
minus signs for excluding terms can help refine the search

Finding Relevant and Reliable Information

 The relevance of information is determined by the search engine’s algorithm,


which considers factors such as keyword frequency and page quality
 Reliable information typically comes from reputable sources such as
educational, government, or well-established industry websites

Evaluating Information Found on the Internet

 The internet offers a wealth of information, but not all of it is accurate or


reliable
 Assess the reliability of information by considering the reputation and
credibility of the source
 Determine the validity of information by checking it against other reputable
sources
 Consider whether the information is biased, looking for perspectives that may
be promoting a particular viewpoint

113
 Check how up-to-date the information is, as outdated information can be
misleading

Protocols
Download PDF

Protocols

 HTTP (HyperText Transfer Protocol)


o The standard protocol for transmitting hypertext (web pages) over the internet
 HTTPS (HyperText Transfer Protocol Secure)
o A secure version of HTTP that encrypts data for security
 FTP (File Transfer Protocol)
o A network protocol for transferring files between computers
o How do you upload and publish content on a website using FTP?
 Download the FTP client program

 Connect to the FTP server using the FTP client program

 Login to the server using the FTP username and password

 Locate the files on your computer

 Click the upload button on the FTP client program

 Upload the files to the folder


 SSL (Secure Socket Layer)
o A security protocol that provides encrypted communication between a web
browser and a web server

Worked example
Q. You have been asked by the secretary of a soccer club to create a website
to publicise its results, fixtures and other events.

When the website has been created it has to be published on the internet. You
plan to upload it onto the internet using FTP.

Explain how to upload and publish the content of a website using FTP.

[4]
4 of:
Download the FTP client program [1]
Connect to the FTP server [1]
Using the FTP client program [1]
Login to the server [1]
Using FTP username and password [1]

114
Locate the files on your computer [1]
Click the upload button on the FTP client program [1]
Upload the files to the folder/web hosting space [1]

Ch Image Editing
Image Editing
 Placing an image with precision: This refers to positioning an image
accurately within a document or other media
o You can usually do this by selecting the image and dragging it to the
desired location
o Some software allows for more precision through the use of
coordinates or alignment tools

 Resizing an image: This means changing the dimensions of an image


o You can often do this by selecting the image and dragging its corners
or edges
o Maintaining the aspect ratio means the image's width and height
change at the same rate, preventing distortion
o Adjusting the aspect ratio can change the shape and proportions of the
image

 Cropping an image: This involves cutting out and discarding parts of an


image
o Cropping tools usually allow you to select a portion of the image to
keep and discard the rest

 Rotating an image: This means turning the image around a central point
o Most software allows rotation to any angle, and common rotations such
as 90 degrees or 180 degrees are often provided as options

 Reflecting (flipping) an image: This means creating a mirror image of the


original
o An image can be flipped horizontally (left to right) or vertically (top to
bottom)

115
 Adjusting brightness and contrast: These tools change the light and dark
values in an image
o Brightness affects all pixels in the image equally, making the image
lighter or darker
o Contrast adjusts the difference between light and dark values, which
can make the image appear more or less detailed

 Grouping and layering images: These techniques help to organise multiple


images
o Grouping combines images so they can be moved or transformed as a
single unit
o Layering involves placing images on top of each other
o You can change the order of layered images, moving them to the front
or back

Exam Tip

 Make sure you use specific technical terms when answering questions on this
topic

Worked example

An image has been changed in several different ways.


Original image

For each of the following images describe the software editing technique used to
produce
the edited images are shown from the original image.
Edited images

116
[4]

A - Resize the image maintaining an aspect ratio [1]


B - Rotate the image 90 degrees anti-clockwise/counter clockwise//270 degrees
clockwise [1]
C - Reflect the image in the Y axis [1]
D - Brightness adjusted [1]

https://www.savemyexams.com/igcse/computer-science/cie/23/revision-notes/

This is the end of this guide. Hope you enjoyed it!

IGCSE Pro - IGCSE Revision Notes © 2023

117

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy