100% found this document useful (1 vote)
246 views52 pages

Edexcel IGCSE ICT 4IT1 Revision Notes

The document provides a revision guide covering hardware, software, backing storage, networking, and the impact of ICT. It defines different types of ICT systems such as PCs, laptops, notebooks, netbooks, handhelds, smartphones, mainframes, supercomputers, and embedded computers. It also discusses the importance of ICT systems in terms of productivity, dealing with vast amounts of information quickly, and rapidly transmitting and receiving information.

Uploaded by

latte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
246 views52 pages

Edexcel IGCSE ICT 4IT1 Revision Notes

The document provides a revision guide covering hardware, software, backing storage, networking, and the impact of ICT. It defines different types of ICT systems such as PCs, laptops, notebooks, netbooks, handhelds, smartphones, mainframes, supercomputers, and embedded computers. It also discusses the importance of ICT systems in terms of productivity, dealing with vast amounts of information quickly, and rapidly transmitting and receiving information.

Uploaded by

latte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

4IT1

ICT
co

IGCSE
lle
ct
Pearson

ed
Edexcel
by
w
w
w
.p
ape
rlo
rd
s.
ez
yr
o.
co
m

REVISION GUIDE
Hardware
1. Types of ICT systems
2. Importance of ICT
3. Input devices
4. Processors
5. Output devices
6. Configuring ICT system to meet need.

Software
1. System Software
2. Application Software

Backing Storage

m
1. Data capacity terminology

co
2. Main Memory

o.
3. RAM vs ROM

yr
4. Storage devices

ez
s.
Networking rd
1. Types of network
rlo

2. Benefits of establishing network


pe

3. Network security
a

4. Requirements for connecting to the internet


.p
w

5. Features of common internet services


w

6. Intranet
w
by

Impact of ICT
1. Impact of ICT on individuals, organisations and society
ed

2. Legal issues in use/misuse of ICT


ct

3. Legal constraints on the use of information


lle

4. Safety
co

5. Computer crime
6. Securing data and personal information
7. Personal responsibility on the internet
Types of ICT systems:
PCs:

A desktop PC usually has these basic


components: a monitor, a keyboard, a system unit
and a mouse.

m
co
Laptops:

o.
yr
ez
s.
A laptop computer is slightly larger and much heavier
rd
than an A4 file.
rlo
ape
.p
w
w
w

Notebook:
by
ed

A notebook computer is a small laptop computer


ct
lle

that is about as big as an oversized book. A


co

notebook computer is likely to be half the size of


a laptop and is lighter and easier to carry.
Netbook:

A netbook computer is a very small laptop that is optimized


for Internet and email access. It is intended to be light and
easy to carry and has a long battery life.

Hand-held:

m
co
A handheld computer or Personal Digital

o.
Assistant (PDA) or palmtop can fit in one hand

yr
or in your pocket, but it is too small for general

ez
work. A PDA usually has a touch sensitive

s.
rd
screen. Although PDAs can be temporarily
rlo
attached to a Keyboard, you cannot comfortably
pe

type a long document into a PDA.


a
.p
w
w
w
by

Smartphone:
ed
ct
lle

A smart phone is a mobile phone with the


co

functions of a PDA. Hand-held computing


devices can perform a range of activities
such as personal record-keeping and
satellite navigation.
Main frame:

A mainframe computer is a very large


and expensive computercapable of
supporting hundreds, or even
thousands, of users simultaneously.

Super computers:

m
These are the fastest type of computers.

co
Supercomputers are very expensive and are

o.
employed for specialized applicationsthat require

yr
ez
immense amounts of mathematical calculations.

s.
For example, weather forecasting requires a
rd
supercomputer. Other uses of supercomputers
rlo
include animated graphics, fluid dynamic
pe

calculations, nuclear energy research, and


a

petroleum exploration.
.p
w

Embedded computers:
w
w
by
ed

An embedded computer is designed for and built


ct

into a specific application where it will perform a


lle

limited range of dedicatedfunctions. The size


co

and functionality of an embedded


computerdepends on the application. They may
be very small devices built into a single
microchip and may control.
Games consoles:

A games console is a PC that is designed specifically for


playing games.

m
co
o.
yr
ez
s.
rd
rlo
ape
.p
w
w
w
by
ed
ct
lle
co
The importance of ICT systems
By using ICT systems we are:
● more productive - we can complete a greater number of tasks in the same time at
reduced cost by using computers than we could prior to their invention
● able to deal with vast amounts of information and process it quickly
● able to transmit and receive information rapidly
IT applications play an important role in our daily life in terms of:
A. communicating applications
● newsletters
● websites

m
● multimedia presentations

co
● music scores

o.
● cartoons

yr
ez
● flyers / posters

s.

B. interactive communication applications
rd
rlo
● blogs
pe

● wikis
a

● social networking websites


.p


w
w

C. data handling applications


w

● surveys
by

● address lists

ed

tuck shop records



ct

clubs and society records


lle

● school reports
co

● school libraries

D. measurement applications
● scientific experiments
● electronic timing
● environmental monitoring

E. control applications
● turtle graphics
● control of lights, buzzers and motors
● automatic washing machines
● automatic cookers
● central heating controllers
● burglar alarms
● video recorders / players
● microwave ovens
● computer controlled greenhouse

F. modelling applications
● 3D modelling
● simulation (e.g. flight or driving)
● spreadsheets for personal finance
● spreadsheets for tuck shop finances

m
co
o.
yr
ez
s.
rd
rlo
ape
.p
w
w
w
by
ed
ct
lle
co
Input devices
1. Keyboard

m
The most widely used input device is a keyboard. This is a set of keys used to operate a PC.

co
Numeric keyboards only have keys to input numbers and few special characters. A QWERTY

o.
keyboard may have a numeric keyboard built into the right hand side.

yr
Advantages:

ez
● Keyboards are almost always available as an input device. They are widely used at

s.
work.
rd
● Many people know how to use a QWERTY keyboard, so help is usually available.
rlo
Disadvantages:
pe

● To use a keyboard efficiently, you need to know the layout and be able to touch-type.
a
.p

2. Mouse
w
w
w

The mouse is the most widely used pointing device. Some have
by

the ball underneath that moves when you move the mouse,
ed

resulting in a similar movement of the pointer on the screen. A


optical mouse detects movement using light instead of a ball.
ct
lle
co

3. Tracker ball

A tracker ball is like an upside-down mouse. The ball is on the top of the device
and you move it with your thumb.
4. Joystick

A joystick is a lever that gives you similar control to a mouse but its behaviour is slightly
different. Joystick can be used separately or can be built into a gamepad, where there are often
two simple joysticks, one for each thumb.

m
co
5. Graphics tablet

o.
yr
ez
s.
rd
rlo
pe

Graphics tablet or a graphics pad is a flat rectangular pad between 6 and 20 inches wide. It
a

works with a stylus which you move along the surface of the pad to produce drawings in the
.p

computer. There are several types of stylus. One, the puck, is small rounded device with
w
w

cross-hairs for tracing lines accurately and with a number of buttons. The stylus can also be
w

pen-shaped. A graphics tablet is used mainly for computer-aided design and drawing.
by
ed

6. Scanner
ct
lle
co

A scanner reads printed data into the computer. A number of different devices are referred to as
scanners:
● A hand-held scanner reads the image while being dragged over it.
● In the case of a flatbed scanner, the image is laid flat on the scanner’s surface, and is
captured in a similar manner to that of a photocopier.
● A sheet-fed scanner feeds the image in through rollers. The scanner reads the image as
the paper goes through. The image must be printed on flexible sheet of paper.
Advantages:
● Scanners quickly convert printed images on paper to electronic form.
Disadvantages:
● The accuracy of the data input is unlikely to be verified.

7. Digital camera

m
co
o.
yr
Digital cameras store pictures on a memory card in a format suitable for saying and displaying

ez
on a computer. Pictures can be transferred from the camera to the computer where they can be

s.
edited and enhanced in graphics software or viewed on screen. The pictures can be transferred
rd
to a computer directly by connecting the camera to the computer, or the memory card can be
rlo
removed and read using a memory card reader, which may be built into the computer or
pe

connected to it. Television sets can also have memory card readers built in or connected so that
a

several people can view the pictures together on a large screen. The picture made by digital
.p

camera is formed by a quantity of very small dots of different colours, merging to form a picture.
w
w

The picture quality is related to the density of the dots making the picture, the accurate
w

placement of the dots and correctness of the colours being displayed. Thus an eight mega-pixel
by

camera uses eight million dots to form a picture and so would produce better output than a two
mega pixel camera. A digital video camera or camcorder has similar functions to a digital
ed

camera but records moving images with sound. Camcorders can save recordings on memory
ct

card but may also use DVD, miniDV tape or a built-in hard disk.
lle
co
8. Webcam

A webcam is a type of digital video camera where the image captured is viewed using a
computer. The computer connects to the webcam over the Web and the image is displayed on
the computer screen. This has a variety of different uses:

m
● You could see if the weather is suitable for skiing by viewing the webcam in the

co
mountains above Grindelwald in Switzerland.

o.
● You could install a webcam at home for security and view this when you are out at work.

yr
● You could attach a webcam to your computer and contact a friend who has a webcam so

ez
that you could both see each other while you are talking.

s.
● You could set up a webcam in a classroom and listen to a teacher from another school.
rd
This might be useful if you were learning to speak English and could not find a teacher
rlo
locally.
pe

Advantages:
a

● Photos and videos can be recorded in a digital form that can be saved on computer. This
.p

makes backup easier, more reliable and more extensive.


w

● Digital photos and video can be displayed on a wide variety of devices,


w
w

● Digital phots and videos can be sent by email.


by

● Digital video can be broadcast over the Internet so that TV programmes can be available
on demand. Disadvantages of webcams:
ed

● Users tend to have more photos and longer videos and this creates a need for more
ct

backing storage.
lle

● High-quality photos and videos can be in very large files. When these are sent by email
co

or broadcast over the Internet, this uses bandwidth and slows down the network.

9. Microphone

Microphone is a device used to record sound, to give voice commands


and for voice communication over the Internet.
10. Touch screen

A touch screen is a two way user interface. It is both an input and output device. You can
interact with the computer by touching pictures or words on the screen. Touch screens are
widely used with tablet PCs, PDAs and smart phones.

m
co
11. Optical Mark Recognition (OMR)

o.
yr
ez
s.
rd
rlo
a pe

OMR technology is used to interpret pencil marks on a piece of paper. An OMR reader can
.p

recognize the position of a mark or set of marks on paper, because the mark is darker than an
w

unmarked area. The computer then records the mark’s position and can analyse it to determine
w
w

the meaning of the data. Marks made on this kind of form must be very clear or they may not be
by

properly recognized.
Advantages:
ed

● There is no requirement to type in the information written on the paper form. Because of
ct

this, input is faster and less expensive.


lle

● The person who fills in the form is responsible for the accuracy of the information on it.
co

● Disadvantages:
● OMR forms must be printed very accurately because the position of the mark on the
paper affects the accuracy of the input. Because of this, printing costs more.
● Verification checks on the input are unlikely to be carried out, so mistakes inputting the
data are less likely to be detected.
12. Optical Character Recognition (OCR)

OCR is the identification of printed or written text characters by a computer. Printed text is
scanned and input to the computer, which attempts to recognize the characters in it. These are

m
then stored as text that can be word-processed. OCR can also be used to read handwriting.

co
OCR software is often included when you purchase a scanner, so that any office with a scanner

o.
has OCR capabilities. A similar process of character recognition is used to interpret handwriting

yr
on the screen of a PDA or tablet computer. PDAs and tablet computers have touch-screen of a

ez
PDA or tablet computer. PDAs and tablet computers have touch-sensitive screens that accept

s.
handwriting as input and have character recognition software that can convert it to text
rd
characters that can be word processed. Advantages:
rlo

● Text printed on paper can be converted to electronic form and edited. This is especially
pe

useful for creating electronic versions of books printed before computers were available.
a

● Disadvantages:
.p

● Character recognition is not always accurate and the electronic text has to be checked
w
w

carefully.
w
by

13. Bar code scanner


ed
ct
lle
co

A bar code scanner or bar code reader reads a pattern of bars representing the code number of
the item on which it is printed. The bar code scanner usually passes a small laser beam over
the pattern and reads in the pattern of reflected light. Bar code scanners may be hand-held, but
some are built into the surface of a supermarket checkout counter.
14. Biometric scanner

A biometric scanner is a pattern recognition which makes a personal identification based on a

m
person’s unique physical characteristics. Biometric scanners can use face recognition,

co
fingerprint matching, iris and retinal scans, voice recognition and hand geometry. Biometric

o.
scanners can be built into mobile phones, desktop and laptop computers, and smart cards.

yr
They can be used to control entry to buildings and can even replace keys in cars.

ez
Advantages:

s.
● There is no need to remember to carry personal identification.
rd
● The person has to be present. This makes identification theft and fraud much less likely.
rlo
Disadvantages:
pe

● Identification using biometric scanners is not yet sufficiently accurate. Permitted users
a

will not be recognized at times, and blocked users will sometimes be permitted.
.p
w
w

15. Magnetic stripe reader


w
by
ed
ct
lle
co

A magnetic stripe card reader reads information from a magnetic strip on the surface of a plastic
card when it is swiped through the reader. Magnetic stripe cards are also used as bank or credit
cards. In addition to being able to read the magnetic stripe, some devices can also write
information to it. The stripe can store a permanent value, such as an account number, or a
value that could change, such as the amount of cash you are allowed to withdraw from a cash
point.
Advantages:
● They are often used as a form of identification that is small and light and can be carried
all the times.
● The data recorded on the magnetic stripe is in electronic form and can be input directly
into a computer.
● Disadvantages:
● The data recorded on the magnetic stripe can be affected by electromagnetic radiation,
such as that from televisions and computers.
● The data recorded on the magnetic stripe can be copied or deleted. This is an
opportunity for determined criminals to commit identity theft and fraud.

m
16. Chip and pin

co
o.
yr
ez
s.
rd
rlo
a pe
.p
w
w

A smart card or Chip and PIN is similar to a magnetic stripe card but has a microprocessor chip
w

embedded in it. The chip can do some processing, as well as storing information. Special
by

devices can communicate with the chip to read and write information on the card. Security
features can be programmed into the chip. Bank and credit cards used to be magnetic stripe
ed

cards but are now more usually smart cards. These cards can be used to withdraw cash at a
ct

cash point. Cash points are specialized computer terminals with a small screen numeric
lle

keyboard and smart card reader. The customer puts their card in the reader and is prompted to
co

enter their four-digit PIN. If the pin entered on the keyboard matches the PIN read from the
cards the customer can proceed: if not, the card is either confiscated or returned to the
customer.
Advantages:
● Often used as form of identification that is small and light and can be carried at all times.
● The data recorded on the chip is in electronic form and can be input directly into a
computer.
● The data recorded on the chip is more secure than data recorded on a magnetic stripe.
● The data recorded on the chip can be updated during transactions.
Disadvantages:
● The data recorded on the chip can be affected by electromagnetic radiation.
● The data recorded on the chip can be copied or edited by very determined criminals
used for fraud.
17. Sensors
Sensors are used to input data about the environment into a computer. There are many types of
sensors. They are available in many different shapes and sizes and they have a wide variety of
uses. For example, sensors can be used to record light intensity, temperature and pressure.
Sensors usually produce a low-voltage which must be converted to a digital signal for the
computer using an analogue-to-digital converter (ADC).
Advantages:
● Sensors can be placed in dangerous locations where people would be hurt.
● Sensors can continuously and reliably record data whereas to organize this using people
could be much more unreliable and expensive.
● Sensors can record data that people do not sense or do not sense accurately, such as

m
co
humidity.
● The data recorded by sensors can automatically record in a form that can be processed

o.
yr
by a computer.

ez
● Data can be collected by a central computer from sensors in remote locations. People do

s.
not need to travel and this saves time and allows data to be collected more frequently.
Disadvantages: rd
rlo
● Sensors cannot interpret the data.
● Sensors detect a very restricted range of the different types of data.
a pe
.p
w
w
w
by
ed
ct
lle
co
Processors
CPU

m
co
o.
yr
A processor or microprocessor is built into a microchip that has memory and other components

ez
built into it. The microchip itself is often referred to as the ‘processor’. If there is more than one

s.
processor built into the microchip, then the microchip is referred to as the ‘processor’ and
processors built into it are referred to as cores. rd
rlo
pe

Graphics card
a
.p
w
w
w
by
ed
ct
lle
co

The graphics card which is also known as video card or display card is housed within the
system unit, and controls the signals going to the monitor screen. Higher quality cards can
produce very clear graphics very quickly. Some computer games demand advanced display
cards and high-quality monitor screens.
Sound card

A sound card controls all input and output of audio. Audio input through a microphone and
output through speakers are usually analogue and the sound card handles their conversion into

m
digital signals processed by the computer. It also handles digital audio input, e.g: from

co
multimedia applications.

o.
yr
ez
s.
rd
rlo
a pe
.p
w
w
w
by
ed
ct
lle
co
Output Devices:

1. Monitor

m
co
o.
Monitors are also known as visual display unit (VDUs). They come in different styles and quality

yr
levels. Screen colour quality, resolution and clarity are just some of the features that affect how

ez
desirable a particular monitor is to you.

s.
rd
Picture elements: Although the picture on a computer monitor may look sharp and clear, it is
rlo
made up of many illuminated dots known as picture elements or pixels. The dots are usually so
pe

tiny that you would not normally notice them individually – you just see the whole picture. If you
could actually see the picture elements, the picture would look jagged.
a
.p
w

Advantages of monitor screens:


w

Enables the use of a graphical user interface.


w

Interactive, on-screen use of a computer is more natural and intuitive than programming.
by
ed

Disadvantages of monitor screens:


ct

Screen size can limit the extent and detail of what can be seen. For example, it is possible to
lle

refer to several printed pages at the same time. It could be much more difficult to arrange this
co

on a monitor.
Screen displays can be difficult to read for people who have impaired sight.
2. Printer

m
co
Types of printer:

o.
● An impact printer usually strikes through an inked ribbon, making marks on the paper. A

yr
non-impact printer uses a non-striking method to form the image on the paper.

ez
● Inkjet printers use tiny dots of ink sprayed onto the paper, forming the shapes of

s.
characters and pictures. Inkjet printers are quiet and produce good quality output. They
rd
usually produce colour prints, and are very popular for home and small-office use.
rlo

● Laser printers use laser light to make patterns of ink on a drum. This drum then transfers
pe

the ink to the paper, and finally a heating process fuses the ink to the paper. Laser
a

technology gives excellent quality and prints quickly. Laser printers are widely used but
.p
w

are more expensive than inkjet printers, and often only print in black and white.
w

● Thermal printers use heated wires to mark dots on the surface of a heat-sensitive paper.
w

● Thermal dye transfer printers use special coloured dyes heated into a gas. This process
by

gives the best quality of colour printing, but is very expensive and requires special paper.
● Thermal wax transfer printers use molten wax, forming tiny dots of different colours on
ed

the paper. These coloured wax dots blend to produce tones.


ct
lle

Buffers and spooling: Printers are much slower than the computers and networks that send
co

information to them to be printed. So that the computer does not have to wait for the printer to
finish printing, most printers have a buffer built into them. A document sent to the printer will be
quickly saved in the buffer so that the computer can do other tasks while the printer is printing
the document.

A buffer will only hold a few short documents, and on large networks many users may be
sharing the same printer. To avoid users having to wait, documents are first put into a queue on
a server and then sent for printing in turn. This queuing process is known as spooling.

Print Quality: All these types of printers use very small dots to produce pictures. The smaller
the dot, the better the quality of the picture. An important measure of print quality is the number
of dots per inch (dpi). The higher the dpi, the better the picture. In addition, for the best-quality
output the dots must be accurately placed.

Printers and paper:


Printers can use different types of paper:-
● Many printers use sheets of A4 paper.
● Some printers have a long stream of continuous paper flowing through. Usually the
paper is perforated, so that it can be torn easily to produce separate pages of output.
There may be several sheets together, either impregnated with carbon or with carbon
sheets between them, so that multiple copies produced at ones.
● In pre-printed stationery, certain information – for instance, the name of a company –
has already been printed on the paper. This is usually the case with utility bills, which are
printed with a high - volume single-coloured printed on forms that already have coloured

m
logos and other symbols printed on them.

co
o.
Photo-printers: Photo-printers are specially designed to print digital photographs. A memory

yr
card storing pictures taken by digital camera can sometimes be plugged directly into the printer,

ez
and the pictures printed. In other cases, the camera can be directly connected to the printer.

s.
rd
Advantages of printers:
rlo

● Printed output can be viewed without the need for a computer.


pe

● Many people and organizations still use paper-based communications and similar legacy
a

methods.
.p
w
w

Disadvantages of printers:
w

● Printing is slow and expensive compared with electronic communications and storage.
by

● Paper is bulky and deteriorates in storage.


● Printed materials are more difficult to access and distribute. For example, printed
ed

photographs can be viewed by a limited number of people compared with digital


ct

photographs displayed on a TV screen, and it is more difficult and expensive to send


lle

copies to others.
co

Multi-function printers: Printers are now being built in combination with scanners, and
sometimes with fax machines. Combining a printer with a scanner produces the effective
functionality of a photocopying machine, as well as providing the separate functions of scanning
and printing.

Advantages of multi-function devices:


● A multi-function device takes up much less space on the desktop than the individual
devices it replaces.
● A multi-function device is usually less expensive to buy than all the individual devices it
replaces.
● A multi-function device will be used more before it becomes obsolete.
● A multi-function device can be replaced more frequently, having provided good value, so
that more modern technology is available for use.

Disadvantages of multi-function devices:


● If part of the device develops a fault, all the functions may be unavailable.
● Only one person at a time can use a multi function device.

3. Plotter

m
co
o.
yr
ez
s.
rd
rlo
pe

A plotter draws lines on paper using differently coloured pens. In a flatbed plotter, the paper is
a

held still while the pen moves. Other plotters have the pen moving from left to right, while the
.p

paper goes forwards and backwards. Yet others use wires to draw charged patterns on special
w
w

paper, then fuse toner onto the electrically charged patterns. An upright plotter can handle long
w

sheets of paper, because of the way the paper flows, and can produce long continuous lines.
by

Plotters are frequently used in computer-aided design.


ed

Advantage of plotters:
ct

Much larger and longer sheets are printed.


lle
co

Disadvantage of plotters:
Printing is very slow
Plotters are usually more expensive than printers.
4. Data projector

A multimedia projector or data projector projects an image that would normally be displayed on

m
a computer screen onto a larger, separate screen. This allows the image on the screen to be

co
shared with an audience in a large room. Multimedia projectors are almost always used when

o.
giving computer-based presentation. Multimedia projectors are also used with home

yr
entertainment systems, enabling people to watch TV and DVDs and to play computer games.

ez
s.
Interactive whiteboards are large touch sensitive panels used as screens for multimedia
rd
projectors. They are operated as touch screens. Some use capacitive or resistive technology
rlo

but others use an optical curtain. Breaks in this curtain are detected and so the computer knows
pe

which part of the interactive whiteboard has been touched.


a
.p
w
w

5. Speakers
w
by
ed
ct
lle
co

Speakers are output unit of sound. This is sued to play music, to make telephone calls using
VoIP, to listen to voicemail, to play video and DVDs for entertainment or education and to listen
TV and radio.
Speakers are also needed for speech synthesis, where a computer reproduces human speech.
The voice need not be recording and could be computer – generated. For instance, you can
have text-reading program that takes a word-processed document in electronic form and reads
it aloud.

Advantages of speakers:
They allow computer systems to be used for a wide range of multimedia applications.
Interaction with a computer using voice recognition and speech synthesis is more natural and
intuitive than programming.’

Disadvantages of speakers:
Applications that use speakers can be difficult to operate for people who have impaired hearing.
Voice recognition systems can be difficult to set up and use.

m
co
o.
yr
6. Control devices

ez
s.
rd
rlo
a pe
.p
w
w
w
by

In control applications, computers make events happen using control devices or actuators.
ed

Examples of actuators are valves, heaters, coolers and motors. These can be powered by a
ct

range of different sources of energy, including electricity and compressed air. Actuators also
lle

include devices such as buzzers and alarms, which can warn us about various events: a burglar
co

has entered through the window etc.

Advantages of control devices:


Actuators enable computer to perform physical tasks in the real world. For example, computers
can control a central heating system or a mechanical digger.

Disadvantages of control devices:


Actuators perform physical operations when instructed by a computer. This can be dangerous
for people if their presence is not known to computer.
Configuring ICT system to meet specified need
If a user selects an ICT system for business, he/she have to consider the following things:

● High speed processor


● Large amount of memory
● Large capacity of hard drive
● External storage devices for backup
● Type of printer
● An operating system with including office
tools

m
co
o.
yr
If a user selects an ICT system for entertainment, he/she have to consider the following things:

ez
s.
● High speed processor
● Large amount of memory (video games
rd
rlo
usually need large RAM)
pe

● Large capacity of hard drive which will


contain user’s movies, games and other
a
.p

files
w

● A graphics card to support all the games


w

● A high quality sound card to enjoy better


w

sound
by

● Monitor with higher resolution


ed

● Must have an operating system with apps to run videos, games, music etc
ct
lle
co
System software
Operating system: The operating system controls the computer. The operating system is
software that runs between the hardware and application software. It enables application
software to use the computer’s hardware and other resources. The OS has many functions,
including the following:

● Input and output control


● Error handling
● Resource allocation
● Providing a user interface

m
● Allowing users to give commands to the

co
computer

o.
● File handling

yr
ez
s.
rd
Applications software
rlo
pe

Office productivity tools:


a
.p

Office productivity software helps you work more efficiently when doing tasks in the
w
w

office. This include:


w

● Word processing
by

● Desktop publishing
ed

● Spreadsheet
ct

● Database
lle
co

Web authoring:

Web authoring software is used to create a website. A websiteis structed collection of


web pages that is accessible via the Internet. Web pages usually include text and
graphics and are written using HTML or software that generate HTML. Web authoring
software like Adobe Dreamweaver gives you a more control over the webpage and may
include facilities to manage your website.
Image and sound editing:

Image and sound editing software helps you prepare and edit pictures, photographs,
video and music.

Presentation software:

Multimedia presentation software helps you prepare for and deliver a talk to an
audience. The monitor display is projected onto a very large screen during the talk. A
presentation will consist of a series of slides with mainly text and graphics, and notes for
the speaker.

Project management software:

m
co
Project management software can be used to track and chartthe timelines of the

o.
individual tasks or events that have to be completed in order to complete a project. A

yr
project could be, for example, the construction of a large building.

ez
s.
rd
rlo
a pe
.p
w
w
w
by
ed
ct
lle
co
Backing Storage

Data storage capacity terminology


● One kilobyte or KB is 1024 bytes
● One megabyte (MB) is 1024 KB or 1024 x 1024 = 1 048 576 bytes
● One gigabyte (GB) is 1024 MB
● One terabyte (TB) is 1024 GB

m
co
o.
Main Memory

yr
ez
s.
Memory
rd
rlo
Memory is a device used to store programs temporarily or permanently.
pe

Main Memory
a
.p

Any data or instructions that are to be processed by the CPU must be placed into main
w
w

memory (sometimes known as primary storage).


w
by

RAM
ed
ct
lle
co

Random access memory can be written to, read from and edited. The data in it can be
accessed in any order. Ram is volatile memory, which means that it is cleared when the
computer is switched off.
ROM

Read only memory can also be accessed in random order, but the data in it cannot be changed.
ROM is intended for permanent data, necessary for the operation of the computer system. ROM

m
is non-volatile, which means that it retains what is stored in it when the computer is turned off.

co
Types of ROM:

o.
● Programmable read-only memory (PROM) has no data locked onto it when first

yr
ez
manufactured. But later, a company using PROM chips to make a computer can
put in its own information. The data would then be locked in place, so the

s.
memory can no longer be changed. rd
rlo
● Erasable programmable read-only memory gets its original data in the same way
pe

PROM does. But, if necessary, the data can be erased using a special light
a

shining on a window on the chip or by electric charge.


.p
w
w

RAM vs ROM
w
by
ed

RAM ROM
ct
lle

Can be written to and read from. Can only read from.


co

Holds program being run and data Stores data and programs permanently.
being processed.

Volatile: it is cleared when the computer Non-volatile: it retains what is stored


is switched off. when the computer is turned off.

RAM microchips are supplied as a ROM microchips are installed in the


module plugged into the motherboard. motherboard.
Storage Devices
1. Hard disks

m
co
A hard disk drive (HDD)[note 2] is a data storage device used for storing and retrieving digital

o.
information using rapidly rotating disks (platters) coated with magnetic material. On each

yr
individual disk, the data is stored in concentric tracks. For every track of data, there are

ez
corresponding tracks above and below it. The corresponding tracks form a cylinder. The number

s.
of cylinders is equal in number to the tracks on each surface of the disk. For each surface there
rd
is a read/write head, set on the tip of a small arm. These heads move in step with each other,
rlo
traversing in and out over the spinning disk. The total storage space on a hard disk is given by
pe

the following formula:


a
.p

number of readable sides x nnumber of cylinders x sector per track x bytes per sector
w
w
w

RAID(Redundant Array of Inexpensive Drives): this storage device essentially carries multiple
by

copies of data, on different hard disk drives. If one falls, the data can still be recovered from the
others.
ed
ct

External Hard Disks: External hard disks are built in a separate case and are robust, small and
lle

lightweight. They can be easily and safely carried around and can usually be connected to any
co

computer with a USB socket.


2. Optical discs

m
co
Compact disks (CDs): A typical CD stores around 700 MB of data on one side of the disc.
Access time is slower than a hard disk. A CD is a piece of plastic, about 4/100 of an inch or 1.2

o.
yr
mm thick. During manufacture, a pattern is etched onto the lower polycarbonate plastic layer.

ez
This pattern is a single, continuous, extremely long spiral track of data. This lower layer is

s.
covered with a thin, reflective aluminium layer. Then a thin acrylic layer is sprayed over the
rd
aluminium to protect it. The CD’s label is then printed onto the acrylic. CD drive has a laser
rlo
beam in the read/write head, which can read the information on the disc.
pe

Digital Versatile discs (DVDs): A digital versatile disc looks much the same as a CD. A
single-sided layer DVD can hold up to 4.7GB on one side. In contrast, a dual-layer DVD can
a
.p

carry two layers of data on each of its two sides: this means it can hold up to 18 GB of video,
w

audio or other information. Types of CD and DVD:


w

● CD-R and DVD-R allow data to be written to them on one occasion only: after this, the
w

data on them can only be read. This enable you to create your own music CDs and
by

record TV programmes on DVD, CD-R and DVD-R are useful for backing up the hard
ed

disk on a computer, because once the data has been written it cannot be deleted or
ct

changed.
lle

● CD-RW and DVD-RW can be written to repeatedly up to around 1000 times and can be
co

used for continuously backing up data or archiving. Data recorded on them can be
deleted or replaced by more up-to-date data.
● DVD-RAM may be sealed inside a cartridge and can be rewritten more than 100000
times. Data written to DVD-RAM is expected to last at least 30 years. DVD-RAM drives
are used in video recorders, camcorders and computers.
● HD DVD is an optical disk format for storing digital information, similar to DVD but with
sufficient capacity for high definition video and movies. Its development was supported
by a group of manufacturers led by Toshiba. HD DVD was created to succeed DVD but
found competition in Blu-ray, which is a rival format. In 2008, HD DVD marketing and
development ceased.
● Blu-ray is a high definition DVD format supported by a group of manufacturers led by
Sony. It is intended as a replaced for the current range of DVDs and is used for
distributing HD material such as movies. A dual-layer Blu-ray can store 50 GB almost 10
times the capacity of a single-sided, single-layer DVD. It is the same size as a CD.

3. Flash memory
Flash memory is a type of EPROM. The memory can be reset quickly and easily so that it can
be written to, read from and edited. It retains what has been stored without a power source.
A common use of Flash memory is for the basic input/ output system (BIOS) of your computer.
On vitually every PC available, the BIOS makes sure the computer starts up as it should and
that all the parts of the computer work together.

m
co
o.
yr
Memory cards are removable and are used in video games consoles, digital cameras, mobile

ez
phones, PDAs and other portable devices. PCs often have card slots. Memory cards can store

s.
up to 32 GB of data. There are many types of memory card, including Compact Flash (CF),
rd
Secure Digital (SD), mini and micro SD, xD Cards, Smart media and Multimedia cards.
rlo
Flash pen devices or memory sticks plug into the USB port on a computer. They are lightweight
pe

and fit easily into your pocket s they are a convenient way of moving data from one computer to
a

another. They have a storage capacity of up to 32GB. They are used by teachers and lecturers
.p

to store presentations and other files, because they can be easily moved from one classroom to
w

another. They are robust and not easily damaged, and are a relatively inexpensive medium.
w
w
by

4. Magnetic tape
ed
ct
lle
co

A magnetic tape is wrapped onto a reel and provides a large amount of surface area. This
abundance of surface means that a great quantity of information can be stored on a tape. But
tape storage offers only serial access. So if you want to access data at the middle of the tape
you must start at the beginning, and forward through the tape to reach the part you want. For
this reason, accessing the data on a tape can be very slow, and so magnetic tape is mostly
used for backing up data not for quick regular access.
Networking

Types of Network
Local area networks (LANs):

A LAN consists of a collection of computers that can share peripherals, share


information and communicate with each other over a network. These are likely to be in

m
the same room, building, department, school or workplace. Each computer that forms

co
part of the network can function both as an independent personal computer running its

o.
own software and as a workstation on the network accessing information from the

yr
network server.

ez
s.
rd
rlo
pe
a
.p
w
w
w
by
ed
ct
lle
co

Advantages of LAN:

● Software and data files can be shared by many users.


● Users can work together on a single shared document.
● Users can communicate using instant messaging.
● Users can stream media.
● Users can access the network from any computer or other device that can be
attached to the network.
● It is usually cheaper to buy one copy of a software application and pay the
license fee for several computers, than to buy individual licenses for each
computer.
● Users can share hardware devices.
● Users can share an Internet connection.
● User’s access rights can be controlled centrally.
● Computers attached to the network can be maintained either centrally or from
any network station.

Disadvantages of LAN:

● Set-up of server and network cabling costs high.


● Data can get corrupt easily.

m
● There is a risk from viruses as they can spread easily between the computers.

co
o.
Types of LAN:

yr
ez
● On a client/server network, one or more computers are designated as the

s.
servers. Client computers are those computers available for you to use. Clients
rd
communicate with each other and externally through the server. The server will
rlo
have a faster processor, more RAM and a lot more backing storage space than
pe

the client computers. A large LAN may have several servers to perform different
a

tasks. For instance, a file server may look after the organization of the files on the
.p
w

network, while a print server coordinates printing on the network. Each server will
w

also have software that manages the services it provides: email and Internet
w

access, shared peripherals and the security of the system. Any computer that
by

gives a user access to any type of network, including a connection to a


ed

mainframe computer, can be called a terminal.


ct

● A peer-to-peer network allows every computer to communicate directly with


lle

very other computer in the network. A user can access data from any computer
co

on the network. They are used mainly in small business and departments.

Cabled LAN: In a cabled LAN, all the computers and other peripheral devices on the
network are attached o cables that are used to transmit data between them. A computer
must be connected to a cabled LAN using a network interface (NIC). The network cable
is plugged into the NIC.

Wireless LAN (WLAN): A wireless LAN differs from a cabled LAN in that computers
can use wireless link to connect to the network instead of being attached using a cable.
The wireless connection is made possible by three sets of components: wireless access
points; wireless network interface cards (NICs) and routers.
A wireless access point contains a radio receiver, encryption and communications
software so that it can broadcast and receive wireless communications. It translates
computer signals into wireless signals, so that it can broadcast to and receive signals
from wireless network interface cards (NICs) on the network. NICs equipped for
wireless communications have a fixed or detachable radio antenna instead of usual

m
co
coaxial cable. Routers enable several computers to communicate through a wireless
access point at the same time.

o.
yr
Bluetooth: Bluetooth is a form of wireless communication designed to enable PDAs,

ez
mobile phones, computers and similar devices to share information and to synchronise

s.
data. Bluetooth requires a transceiver chip in each device. The data transfer rate is 720
rd
rlo
kbps with a 10 metre range.
pe

Wide area networks (WANs):


a
.p

A WAM can connect networks across a large geographical area, such as a city or a
w
w

country or even internationally. Information can be transmitted in many ways: for


w

example using high-speed telephone lines, fibre optic cables, microwave links and
by

satellite links, or a combination of these. WANs are used mainly by universities, large
ed

companies and banks with branches in different countries, to share information and
processing loads.
ct
lle
co

IP address:

Each computer on the Internet has a unique address that identifies it. This unique
address is a number called IP address (Internet Protocol address), which is a 32-bit
address consisting of four sets of up to three digits each, separated by full stops. The IP
address could be static or dynamic. To connect to a computer on the Internet, your
computer needs to know its IP address.
Benefits of establishing a network
By establishing a network we can:
● Share peripherals from hundreds of computers.
● Share data between people continuously
● Communicate easily
● Access to Internet simultaneously
● Stream media
● Distribute software

m
co
Network Security

o.
yr
Threat Protection

ez
s.
Hacking is unauthorised access to your Use a username and password. Don’t
computer or files and to your personal
rd
give these to anyone and don’t write them
rlo
information, e.g. email and bank accounts. down.
pe

Use a firewall. This is a combination of


a
.p

hardware and software that controls


w

network traffic between a secure computer


w
w

or network and the Internet.


by

Use WEP (Wired Equivalent Privacy) or


ed

WPA (Wi-Fi Protected Access) codes


ct

which prevent unauthorised connection to


lle

a wireless network.
co

Encrypt data. Encrypted data cannot be


understood by someone without the
encryption key. This prevents hackers
understanding data on the ICT systems
they access.

Use a transaction log to track use of the


system. This can show hackers’ activities
and help identify them.
Hacking is often by authorised users
accessing ICT systems they should not.
Restrict users’ file access rights to prevent
this.

Spam is unsolicited email. There is so Use a spam filter to scan incoming email
much spam that it can swamp legitimate and remove unwanted email messages.
email.

A virus is malicious software installed on Use antivirus software which checks for
a computer without the user’s consent. viruses and removes them, e.g. McAfee
Viruses can be attached to emails and VirusScan. Treat files from unknown

m
downloaded with software. sources with caution.

co
Phishing is an attempt to find out Look for spelling and grammar errors,

o.
personal information in order to carry out which are unlikely in an email from a bank.

yr
ez
identity theft and fraud, e.g. you receive Suspect a phishing attack when you

s.
an email asking you to access your online receive an email claiming to be from a
bank by clicking on a hyperlink in the
rd
bank, as they do not usually send
rlo
email. However, the link takes you to a unsolicited emails.
pe

fraudulent website where you enter your Check that you have an account with the
a

username and password. These are bank.


.p

stolen and used to take money from your If you are worried your bank is really trying
w
w

bank account. to contact you, break the connection with


w

the email then contact the bank directly.


by

Remember that you are unlikely to win a


competition you haven’t entered!
ed
ct

Pharming is an attempt to collect Detect and destroy spyware using


lle

personal information when users connect antivirussoftware and specialised


co

to legitimate websites. Spyware installed programs, e.g. Spybot Search & Destroy.
on a user’s computer logs their personal
information as they enter it.

Adware is unsolicited advertising which Block adware and pop-ups in a browser or


often generates pop-up adverts. using antivirus software and specialised
programs, e.g. Spybot Search & Destroy.
Access to inappropriate information, Use parental control (or filter) software
e.g. children accessing pornography. to restrict children’s access to
inappropriate information, e.g.
CYBERsitter. Features are:
Access to some web addresses, searches
on some keywords and sending some
personal information are blocked.
The URLs visited are recorded.
Parents are notified by email that blocking
is occurring.
Parents are able to change filter settings

m
over the Internet.

co
Cookies are saved on your hard disk by Use a cookie manager to block cookies

o.
websites and contain personal information or remove them using a browser.

yr
ez
that can be accessed by the website.

s.
rd
rlo
ape
.p
w
w
w
by
ed
ct
lle
co
Requirements for connecting to the
internet
Hardware:

m
co
o.
yr
ez
s.
rd
rlo

i. Modem: Modem is a device that connects one computer to another using a


pe

telephone line so that data can be sent.


a
.p

ii. Router: Routers enable several computers to communicate through a wireless


w

access point at the same time.


w

iii. Gateway: Gateway is a router that connect two computer networks with different
w

protocols.
by
ed

Software:
ct
lle
co
i. Web Browser: A web browser is software that lets you access the information
available on the Web. Popular browsers include Microsoft Internet Explorer and
Mozilla Firefox. All web browsers operate in a very similar manner and have
similar features.
ii. Email client: An email client is used to send email.

Type of Connection:
i. Broadband: Broadband is usually available over telephone land lines or cable.
This refers to data transmission using ADSL and cable. ADSL is a means of
transmitting digital signals using telephone lines. Coaxial cables, fibre optic

m
cables, microwave links and communication satellites are commonly used to

co
provide broadband. Microwave signals are very high-frequency radio signals that

o.
can be transmitted through space. A communications satellite accepts signals

yr
beamed to it from a point on Earth and then reflects the signals to another point.

ez
Communication satellites can transmit data that includes text, voice, pictures and

s.
video. rd
ii. Dial-up: Dial up is when your computer dials up a phone number to connect you
rlo

to your ISP using telephone line. This is a legacy method used by individual
pe

home users to access the Internet. Dial up connections are very slow but
a
.p

inexpensive if you do not access the Internet very often.


w

iii. Wi-Fi: A Wi-Fi sends data wirelessly i.e. using radio waves instead of cables.
w

iv. VPN: A VPN is private network that runs within public networks. Conceptually it is
w

similar to an extranet but network traffic will be encrypted and Internet protocols
by

such as TCP/IP might not be used. It can be thought of as a separate ‘pipe’


ed

inside the Internet. Network traffic inside the pipe is inaccessible to those outside
ct

the pipe.
lle
co
Features of common internet services
Source of Services:

To access the Internet you need to subscribe to an Internet Service Provider (ISP). This
is a company that is directly connected to the Internet and gives you access to it,
usually for a fee.

Uses:

● View hundreds of millions web pages, all over the world.

m
● Use a search engine such as Google to find the page you want.

co
● Send and receive email.

o.
● Use online shopping and e-commerce – you can buy goods, pay for them online

yr
and have them delivered o your door.

ez
● Do your banking.

s.
● Access customer support – many commercial organizations support the sale and
rd
rlo
maintenance of their products by putting information about their features and how
pe

to maintain them on the Web. Company websites often have help and FAQs
which support customers using their products.
a
.p

● Software distribution – for example, you can download free software or purchase
w

it online, and download printer drivers.


w

● Access and discuss information – mailing lists, bulletin boards and newsgroups
w
by

provide you with the information you need.


● Join discussion groups and chat online.
ed

● Participate in conferences – you can even use a sound card, speakers and a
ct

microphone to talk to other users.


lle

● Browse web rings.


co

● Receive web broadcasting.


● Advertise your business by setting up your own website or purchasing adverts on
other websites.
● Build your own website and upload it to the Web.
● Upload and download digital media, such as music, images and video and
publish these on the Web so that they can be shared with friends and family.
● Publish an online personal diary with narrative, pictures and hyperlinks.
● Describe and define particular topics in collaboration with other web users, using
a wiki. An online encyclopedia could be a wiki, and you would find articles about
history, science and many other topics that have been written by many different
contributors.
● Use social networking sites to communicate with a closed circle of friends who
can see the information about yourself that you upload.

Intranet
An intranet is a local version of the Internet within a company or organization. It offers
many of the same features as the global Internet, but in a localized environment such as
a factory site or an office. Many companies make large volumes of information – such

m
as notice boards, staff directories, training manuals, company reports, job adverts and

co
newsletters – available to their employees on an intranet. An intranet allows information

o.
about organizational procedures to be centralized, leading to more consistent

yr
operations and the distribution of the forms used for record keeping from a centralized

ez
repository.

s.
rd
Authorised users within a company can use the company’s intranet to find information
rlo
easily and quickly. An intranet uses the same browsers, TCP/IP and other software as
pe

used for the Internet. If a company has an intranet and allows limited, secure access to
a

it by people working off site, for example at home, the intranet is referred to as an
.p
w

extranet.
w
w
by
ed
ct
lle
co
Impact of ICT

Impact of ICT on individuals, organisations and


society
Positive effects:

● Easy ways are found to pay the employees in a company using payroll

m
co
● Fast and flexible access to airline booking system from internet

o.
● Large supermarket stock control are done by ICT, which is difficult to do

yr
physically

ez
● Easy means of banking

s.
● Large amount of cash can be carried using credit or debit card and cash can be
rd
withdrawed using ATM
rlo

● Computer-aided design are used in designing for engineering


pe

● Faster production of products


a

● Weather can be forecasted


.p
w

● Robots perform complex industrial or manufacturing physical tasks


w

● Education system is developed


w

● Law enforcement became stronger


by

● Expert medical systems are build


ed

● Wider range of entertainment and leisure opportunities


ct
lle

To read details of each points visit here.


co

Negative effects:

Areas of Increased Unemployment


Some jobs have been lost as a result of computers being used to do the same work that people
used to do.
Some examples of areas have suffered job losses:
Manufacturing
Many factories now have fully automated production lines. Instead of using people to build
things, computer-controlled robots are used.

Robots can run day and night, never needing a break, and don’t need to be paid! (Although the
robots cost a lot to purchase, in the long-term the factory saves money.)
Secretarial Work
Offices used to employee many secretaries to produce the documents required for the business
to run.

Now people have personal computers, they tend to type and print their own documents.

Accounting Clerks
Companies once had large departments full of people whose job it was to do calculations(e.g.
profit, loss, billing, etc.)

A personal computer running a spreadsheet can now do the same work.

Newspaper Printing

m
It used to take a team of highly skilled printers to typeset (layout) a newspaper page and to then

co
print thousands of newspapers.

o.
yr
The same task can now be performed far more quickly using computers with DTP software and

ez
computer-controlled printing presses.

s.
rd
rlo
a pe
.p
w
w
w
by
ed
ct
lle
co
Legal issues relating to use/misuse of ICT and the
constraints placed on individuals
Computer crime

Computer crime – that is, crime is only possible because of the widespread use of ICT
systems and networks – has increased in variety and extent.

Software piracy

Software piracy is the unauthorized copying using or selling of software without an

m
appropriate license. It includes copying CDs with software or music on them, and

co
downloading software or music without paying for it. These activities are effectively

o.
software theft.

yr
ez
Copyright violation

s.
rd
Using the Web you can download music, pictures, animated graphics, videos and
rlo
books, as well as software. The copyright to some of this material is restricted to its
pe

owners. They may sell you the right to copy it, but if you copy it without permission this
a

is effectively theft. The profitability of the music industry has been badly affected by
.p
w

music being freely copied and downloaded over the Web.


w
w
by
ed
ct
lle
co
Legal constraints on the use of information

Legal issues about what you may do with personal data


Fortunately, for the IGCSE ICT course, the directive can be reduced to 8 principles.
Briefly, these are:

1. A person must be told when their data is collected.


2. Data must only be used for the purpose given when it was collected.
3. Data must not be disclosed without the consent of the person concerned.

m
4. Data must be kept secure.

co
5. A person whose data is being collected must be told who is collecting it.

o.
6. A person must be allowed to access their data and make corrections if it is not

yr
accurate

ez
7. Data must not be transferred to another country that has weaker data protection

s.
laws rd
8. There must be a method by which people can check that data holders are
rlo

complying with the principles.


ape
.p

Legal issues when obtaining information


w
w

Rules while downloading content from internet:


w
by

1. The Internet is international. What may be legal to upload and download in one
country, may be breaching copyright or some other law if it is downloaded in
ed

another country.
ct
lle

2. Licences and permissions come in many forms. What may be free to download
co

for e.g. a student in full time education, may need to be paid for by anyone else.
3. Different types of download may be covered by different laws. Most material has
to comply with copyright law, but an item such as a computer programme, or part
of one, may be protected by a patent as well.
Safety
Effect on user’s health

As employees spend more time at work using ICT, there is a greater likelihood that this
will affect their health. Ergonomics is important in reducing injury to people using
computers. This includes:

● The design and arrangement of the seating and the computer system, especially
the keyboard and monitor.
● Arrangements to support someone using the computer; that is, foot and wrist

m
supports.

co
● Rules governing the user’s behaviour when using the computer; for example,

o.
how often to take breaks.

yr
ez
The health risks associated with intense and prolonged computer use are:

s.
rd
● Repetitive strain injury (RSI) to the hands and arms. RSI is a painful condition
rlo
that occurs because of damage to tendons, nerves, muscles and soft body
pe

tissue, and can be caused by the repetitive use of keyboard and a mouse. It can
a

be avoided and its effect reduced by taking regular breaks using a specially
.p

adapted ergonomic keyboard and a wrist support.


w

● Eye problems such as soreness, lack of focus and eye dryness can arise from
w
w

staring at a monitor all day. Potential problems can be avoided by taking regular
by

breaks, having regular eye examinations by an optician and using antistatic and
ed

other screen filters. Monitors should be positioned to avoid light reflecting on the
screen, and a interio lighting should be shaded and directed to avoid reflections.
ct
lle

Using a larger screen can also help.


co

● Backache and similar problems. These can arise through sitting in an


inappropriate posture for long periods of time. The solution is to use a
purpose-designed operator’s chair with adjustable height and backrest, and a
footrest, and to take regular breaks.
● Fatigue and headaches.
● Trip hazards. These are associated with trailing cables and should be reduced by
putting cabling in trunking or where it is not likely to interfere with the user’s
movement.
● Electric shock. This can be minimized by the use of a RCD on the main power
supply to the computer. This is designed to turn off the power if the user receives
an electric shock.
Computer Crime
Software piracy

Software piracy is copying, downloading, using or selling software without an


appropriate license.

Copyright Violation

It occurs when, e.g. music or pictures, are copied or downloaded without an appropriate
license.

m
Hacking

co
Hacking means gaining unauthorized access to an ICT system, and an individual who

o.
yr
does this is referred to as a hacker. Many hackers break into ICT systems just for the

ez
challenge or as a prank. This might seem harmless, but it can cause considerable

s.
damage and is illegal in many countries.
rd
rlo
The reasons why criminally minded hackers gain unauthorized access to ICT systems
include:
ape

● To steal data – this may have a security classification or could be


.p

commerciallysensitive.
w
w

● To alter data or destroy data, by deletion or by installing a virus to destroy or


w

corrupt it. This may be done in order to disrupt legitimate commercial or


by

governmental activities.
ed

● To steal money by transferring it from one account to another using EFT.


ct
lle

Identity theft
co

When you are connected to the Web, spyware may be installed on your computer
without your knowledge. This could send information about your computer to others who
may have malicious intent.

Phishing

A phishing attack is when you receive an unsolicited email inviting you to a response
that involves you entering your username, password and other personal details.
Securing Data and Personal Information

Physical safeguards
Physical safeguards deal with the protection of hardware and software from accidental
or malicious damage or destruction. For example:

● Access control to ICT rooms using locks that are opened using entry codes,
swipe cards or biometrics such as fingerprints and retinal scans. Security guards
can ensure that those entering using entry codes and swipe cards are actually

m
those who are allowed entry.

co
● Access monitoring using CCTV cameras so that those entering and leaving ICT

o.
rooms can be recorded.

yr
● Data security can be ensured by taking regular backups and storing these in a

ez
fireproof safe in another location.

s.
rd
● Protect hardware from fire, floods, theft and malicious damage by locating it in
rlo
buildings and areas where such problems can be reduced, for example, in a
pe

concrete underground bunker on top of a hill that is accessible only through a


a

well guarded and narrow passage. Or more usually, not on the ground floor of a
.p

building where hardware is accessible to thieves.


w

● Further precautions to protect hardware from theft involve clamping individual


w
w

computers to desks or securing them to wall; installing burglar alarms attached to


by

individual computers in addition to those already used for the building and using
CCTV cameras in ICT rooms to discourage inappropriate use of computer
ed

equipment and to allow any such use to be traced and the culprits identified.
ct

● Make detailed contingency plans and disaster recovery arrangements so that ICT
lle
co

systems continue operating with a minimum of disruption and recovery is swift.


For example, make arrangements with an organization with similar ICT facilities
that is located at a distance so that their ICT facilities can be used should your
own be destroyed.

Software safeguards
Software safeguards can protect data from theft or damage by hackers and other
unauthorized persons accessing the software to steal or damage it. For example:

● Use of ICT systems and networks in restricted to those who have valid
usernames and passwords.
● Access permissions that allow access to the data to the minimum number of
people who need it. Others are blocked from accessing the data.
● File-level passwords that restrict access to individual files to those who have
appropriate access permissions and passwords.
● Use a virus scanner to prevent viruses entering your system. The intention of
some viruses is to damage software recorded on the ICT system or steal it by
copying it and emailing it to unauthorized persons.
● Use a firewall. This is a program or hardware device or combination of both that
filters the information coming through the Internet connection into a computer or
network, to prevent unauthorized users from gaining access. Some firewalls also
block cookies, pop-up adverts and spam. Popular firewall software packages are
BlackICE Defender, ZoneAlarm, and Freedom.

m
● Data encryption is used so that if data is access by unauthorized persons it

co
o.
cannot be understood. Encrypted data is scrambled during storage and

yr
transmission so that it cannot be understood by someone without the encryption

ez
key to unscramble it. Wireless networks can be encrypted using WEP (Wired

s.
Equivalent Privacy) and WPA (Wi-Fi Protected Access)
rd
● Establish transaction logs to automatically track alterations to ICT systems.
rlo

Including the identity of those who access data and all the changes made.
ape
.p
w
w
w
by
ed
ct
lle
co
Personal Responsibility on the Internet
The ways each individual uses the Internet and the Web can have a considerable social
impact as this is aggregated and its impact emphasised by the use of networks. It is
important to behave sensibly to protect yourself and others because the openness and
freedom of the Internet can be abused by criminals.

● Be very cautious who you share personal data with. Don’t publish your personal
data on web pages that anyone can access.
● Don’t publish anyone else’s personal data anywhere unless you have their
permissions.

m
● Make sure you know who stores your personal data and that it is correct.

co
● Don’t copy someone else’s work and write it as your own. This is plagiarism.

o.
● Don’t download software or music unless it is not copyrighted.

yr
● Do not involve in activities such as hacking.

ez
● Don’t believe everything you see or hear over the internet.

s.
rd
● Be polite and reasonable in all your online interactions. If you feel you are the
rlo
victim of cyber bullying seek help. Don’t bully others.
ape
.p
w
w
w
by
ed
ct
lle
co

You might also like