Ict Revision Notes.
Ict Revision Notes.
Mainframe computer – Large, powerful computer that carries out complex tasks (such as statistical analysis) rapidly and
can be used by many people simultaneously.
Microprocessor – Controls what the computer does. It takes data as input, processes it, and gives out an output.
e.g. Washing Machine, Television, Household appliances.
Laptops and desktops are types of personal computers. Laptops can be used as desktop replacements.
1) Education
2) Embedded Computing – Computing hardware that’s fixed in position and carries a specialist task.
3) Physical Computing – Interactive systems that can detect and respond to the surrounding environment.
Embedded computing can be found in calculators. Physical computing can be found in robotics. They are total
opposites.
Wi-Fi – A way of
For mobile phones to connect to the mobile phone network, they need to have a SIM Card. connecting
computers or
SIM = Subscriber Identity Number, so it is used to identify the device on the mobile phone network. machines to a
network or the
Specialists Phones – Are phones with special features that meet the user’s needs. internet using radio
signals.
This can be an “accessibility need” or something like with an "Emergency feature”.
Smartphones – In addition to the features of a mobile phone, they have Wi-Fi Connectivity and can access the
internet.
Additionally, they have features from other devices such as cameras and hand-held game consoles
Their operating system is more complex, and hence they use more energy, and require charging sooner
than other mobile phones.
Tablets – Slightly bigger than smartphones but carry out mostly the same functions.
Some more digital devices are listed in the table on the next page:
Navigation aids – These calculate the best routes with shortest distance, least traffic and shortest duration of travel.
- GPS (Global Positioning System): Multiple satellites will cross their radio signals to pinpoint your location. This
does not need an internet connection.
- GIS (Geographical Information System): Needed to render the maps, roads houses etc. This does require an
internet connection.
e.g. – A phone can take pictures, send messages, make calls, and even work as a game console.
1) Portability
A portable device is one that is easy to carry and move around.
2) Performance
High performance means high speed.
High speed means it can carry out or “process” information quickly.
This required a good processor and a large RAM (discussed in Chapter 3)
3) Storage
More storage means more files and programs can be stored.
Storage may also affect performance (specifically in the case of virtual memory)
4) User Interface
This is basically the method by which the user interacts with the system
5) Connectivity
Devices can share date through connecting to each other either wirelessly or using a wire.
6) Media Support
Items such as memory cards can be read and written.
Some devices do not have built-in media support and to they must use external devices
7) Energy Consumption
Low energy consumption = Longer battery Life = Save customer’s money + Present social responsibility
8) Expansion Capability
Some PCs allow users to install additional components through expansion slots.
9) Security Features
Edexcel IGCSE ICT Revision Notes
a. Software Security:
Locks through PIN/Password
Swipe/Patterns
Longer/More random and complex = Better
Biometrics
b. Physical Security
Specialists slots/Locks
Peripheral device – A device that can be connected to a computer to either give input or output or for storage.
- Keyboards
- Pointer devices (Mouse, Tracker ball, Track Pad, Joystick, Graphics tablet)
- Scanners
o OCR – Scans text/numbers (Optical Character Recognition)
o OMR – Scans mark (MCQ Exam Papers etc.) (Optical Mark Recognition)
- Barcode Scanners
o Linear – On food products etc.
o Matrix (QR) – Hold more information + Scanned at any angle.
- Webcam
- Microphones
o Diaphragm moves when air hits it.
o This produces and analogue electrical signal.
o Electrical signal is converted to digital signal using the sound card.
- Touch Screen
o Resistive – Force is applied by fingers.
o Capacitive - Electrical signals are transferred from fingers to screen
- Biometric Scanner
o Includes: Iris, Fingerprint, Face and Voice
o Fingerprints can be of different types – Arches, Loops and Whorls
o Iris is the most secure
o Advantages – Easier / Harder to trick / Faster transactions / No language barriers
o Disadvantages – Stores personal info / Expensive / Some feel uncomfortable
- Card Readers
o Magnetic Strip – Least secure as no pin is required.
o Programmable Chip – Data is only readable when the correct pin is entered.
o Radio Frequency Identification and NFC – Like Apple Pay. Uses wireless communication.
▪ When scanned, ID is linked to database records
- Sensors
o Input data from the physical environment
o Benefits – Dangerous places / Continually monitor / Remove human error / Easily analyzed data
- Monitors
o Quality affected by: Screen size + Resolution + Energy Efficiency
- Printers
o Dot Matrix – Punches holes through paper. Very Loud. Very Slow. Cheapest cost per copy. Can carbon
print.
o Inkjet – Motor moves printer head across a page. Cartridges of spay in on the paper through the nozzle.
Quick. Expensive per copy. High quality
o Laser – Drum emits an electrical charge. (Like physics photocopier). Fastest. Most Expensive. Medium
cost per copy. Highest quality.
o 3D Printers – Real-life version of digital models
- Plotters
o Used by cartographers
- Data Projector
o Quality depends on: Zoom Functionality + Quality of Lens + Light Bulbs + Resolution
- Speaker
o Mono sound – Sound produced from one side.
o Stereo sound – From two different sides.
o Surround sound – From all different sides.
- Control Device
o Components of a system that make something happen in real life.
Storage medium is what holds the data and what the data is read from.
Storage device is what reads the data and allows it to be presented on the device.
e.g. DVD Disk is the media while DVD drive is the device.
It is used for:
Devices:
1. Hard Disk Drive. This contains hard disk media and is connected to the motherboard internally or externally.
2. Solid State Drive (Flash drives). This contains solid state medium and is like HDDs.
3. Optical Disk Drives. These contain Optical Disk Media. They have backwards compatibility.
Edexcel IGCSE ICT Revision Notes
Media:
1. Hard Disks
A hard disk is made up of a spindle and concentric platters around it as well as a read/write head.
The speed of the hard disk is determined by:
a) The speed of the concentric platters (Revolutions Per Minute)
b) How fast the read/write head moves on the platters.
The read/write head does two different things when reading and writing:
The seek time is the time taken by the RW head to locate the area on the platter where it needs to read/write
data.
2. Optical Media
4.5 GB One Sided Shorter wavelength of red laser and hence more
DVDS
18 GB Two Sided data
3. Flash Media
There are no moving parts and so its energy efficient and portable
4. Magnetic Tape
In the past it was only used for music but now its used for both
8 bits = 1 byte!
Example:
1Kib = 1024
1GiB = 10243
1 byte = 8 bits
128 x 8 x 10243
ACCESSIBILITY
If asked about examples if devices for accessibility needs, give the following;
There are two main different kinds of software, system software and application software.
System Software – Allows users to manage, configure or operate the operating system.
1. Utility Software:
This allows the user to maintain the operating system and carry out configuration tasks.
1. Backup
Creates a copy of files and data.
2. Defragmentation
Data is found on a disk, and so it may be highly spread apart, or sorted out of order, or in other words, it’s
fragmented.
Defragmentation reorders the fragments of the data so that they are closer together and easier to locate.
3. Compression
Compression decreases the size of data files to reduce the amount of space taken up by storage.
4. Formatting
Formatting makes all data on a disk unreadable.
2. Operating System
Therefore, there are certain features that allow the users to separate the systems.
A) Resource Management
This makes sure certain aspects of hardware are available when required.
For example, if Zoom needs the webcam, the Resource Management would make it available to
Zoom.
B) Memory Management
This makes sure enough RAM is available to the applications that require it.
C) Print Spooling
Creates an order for documents to be printed.
For example, when a teacher sends a document to be printed, it would be in a queue for all
documents waiting in line to be printed by other teachers.
D) Security
Separate usernames and passwords, which can be used and sent to authentication software to gain
access.
Single user network – This could also allow the user to change the user interface.
Application software – Software that helps a user create a digital product or carry out specialist tasks. For example, a
presentation, an image a website etc.
Apps can be downloaded from servers on the internet or directly onto the local storage of the device.
Below is a table giving examples of several application software and their functions.
Office productivity software is software that allows a user to carry out work-related tasks.
Application Suites contain applications that have the same user interface and can share files and data between each
other.
For presentation software, speaker notes can be added to help guide the presenter through their presentation.
They can be used to allocate tasks, track resources and their orders, assign to employees/team members.
Communication Software – Provides remote access to systems that allow users to transfer information and data.
- Social Media
- Websites & Email
- SMS (Short Messaging Services)
o This doesn’t require an internet connection.
o You cannot send images/audio or files on it.
o There is a limit of 160 characters to be sent.
- MMS (Multimedia Messaging Services)
o This doesn’t require an internet connection.
o You can send images/audio or files on it.
o You can send more than 160 characters.
- Instant Messaging
o This requires an internet connection.
o You can send images/audio or files on it.
o There is no limit.
o Has extra features such as seeing the user’s activity status, and whether they read messages.
o Examples include WhatsApp.
A software license is the agreement between the developer/producer and the user.
1. Open-Source Software
Everything is made available to the user. They can distribute it and make changes and resell it. This includes the
source code, so they can make any changes/redevelop the software.
2. Free Software
This is software where everything is made available to the user. They can distribute it and make changes and
resell it. However, the source code is not available.
3. Proprietary Software
Proprietary software is a license where the user is not allowed to distribute or edit the software under their
own name. E.g. Microsoft Office.
4. Freeware
This is a type of proprietary software that is offered for free.
Software Updates:
It’s important to note that when updating software, there is a chance of data being lost.
Hence backup should be carried before updates, and all systems should be checked so that we make sure they are
compatible with the new software.
Memory is used to store instructions so that the processor can quickly fetch, decode and execute them.
This is how you should understand the difference between secondary storage, RAM, and the processor.
Secondary
RAM Processor
Storage
Fetches, Decodes and Executes
Programs currently in use instructions from RAM
Programs not in use
RAM is volatile – meaning that when power is lost, all the data stored on it is also lost.
A bigger RAM can hold more opened files at the same time without the need for virtual memory.
Virtual Memory – This is created when the RAM is full. An area of secondary storage is used to store data
instead of RAM. This means the processor needs to fetch data from the secondary storage rather than the
RAM which massively impacts the suer experience by slowing down the device’s performance.
If files that are not in use however are closed, space is emptied up in the RAM and data is moved back there.
A student has 16 chrome tabs, an Excel sheet, his Chemistry Lesson PowerPoint and a Word Document opened. However,
he only has 4GB of RAM.
Therefore, there is no space for PowerPoint and Word Document. They are moved from the RAM to the Secondary
Storage. As a result, the student experiences massive delays when navigating with the PPT and Document.
Unlike RAM, ROM is non-volatile (If power is lost, the data isn’t lost)
- Store data for single use computers such as calculators and digital watches
- In PCs to store information needed to boot the system
However, the contents of the ROM can be adjusted in a few types of ROM:
- PROM (Programmable Read Only Memory) – Data can be written, however only once.
- EPROM (Erasable Programmable Read Only Memory) – Data can be erased and re-written with exposure to UV
Light.
- EEPROM (Electrically Erasable Programmable Read Only Memory) – Data can be erased an re-written if a high
voltage is applied to a certain pin in the ROM
Remember, ROM stores permanent data and cannot be upgraded, while RAM stores temporary data and can be
upgraded.
Flash Memory
It has no moving parts. Therefore, it is portable and has a low power consumption.
1.7 Processors
In some cases, there is more than one CPU, by which we then call each one a core. For example, a quad-core has 4 CPUs.
Processor cycle – The cycle by which a processor fetches from memory, decodes and executes instructions.
A clock cycle per second – The number of times in one second that a processor can carry out on or more instructions, (In
simple terms, the number of processor cycles carried out per second). They are measured in Hertz (Hz)
The number of instructions taken per cycle also accounts for the speed.
Good (High) Bandwidth means very rapid uploads and downloads, as well as complex tasks happening much quicker.
Good (Low) Latency prevents lag from occurring, and in times of watching live events online, there would be no delay
between real-time content and presented content.
Streaming:
Remember that when streaming the content being streamed is not fully downloaded.
Rather, as you keep watching, the buffer fills up with more and more data being added.
If the buffer has no data in it, the video being watched will stop until the buffer plays again.
Example:
If you’re watching Loki as soon as you open it content will begin to fill up in the buffer.
If you reach the 7th minute and eventually it stops, that means the buffer is empty (there is no content to play) and hence
you have to wait till the buffer refills with enough data to present.
Devices can connect to each other in several ways, whether wirelessly or in a wired manner.
Network Communication
When two or more devices are connected to each other, a network is created.
4. Tethering
This is when a host device shares its mobile broadband with another device, so that the other device uses its
broadband.
Basically, enabling 4G and 5G.
Enabling tethering means that the original user has less bandwidth and so will experience slowdowns. This is
because broadband is shared equally between both devices.
Remember, when using Broadband, a device uses an Internet Service Provider to connect to the internet.
Digital devices can share and receive data with each other through several different ways detailed below:
1. Satellite Communication:
Advantages:
- They are not affected by power shortages.
- They are accessible all the time.
Disadvantages:
2. Broadcast Communication:
Analogue Broadcast
- A broadcaster transmits analogue signals that are received by antennae of houses.
- The signals are then passed through a wire which converts the analogue signals into images/audio.
3. Wired Communication:
Ethernet Networking
Ethernet – A network connectivity standard that provides a way for computers to communicate.
4. Wireless Communication:
Just like wired communications, there are several wireless communication methods:
- Wi-Fi
- Bluetooth
- 3G and 4G
- Infra-red
- NFC
WIRED WIRELESS
Faster Lower costs (No need for cables
More Stable Less Maintenance
More Secure (No tripping hazard)
Less Mess
More Portable
There are requirements for devices to connect to a network so that they can abide by the protocols.
1. IP Address
IPV6 was developed because the number of devices was growing faster than the number of physical users.
2. MAC Address
The second three pairs – Unique to the device and its NIC
E.g. – Every individual Lenovo device has a different second three pairs.
1. Identifying devices on a network (E.g., in malls when they only give you a certain amount of Wi-Fi time. If
you log in again you are rejected because your MAC Address is identified)
2. Tracking devices on a network
3. Changing device’s access rights to a network
4. To adjust dynamic/static IP Addresses
Since IP Address constantly changes, using MAC Address you can specify a fixed IP Address for a device when
it connects to your network.
3. Device’s Name
This is not the best way as several devices on one network can have the same name
Edexcel IGCSE ICT Revision Notes
Components of Wired and Wireless Networks:
Networks typically have a few standard components which we need to know about:
A) Cables
Cables are used to connect devices in a wired network.
Variations include: Cat5e, Cat6 and even optical fibers.
Measurements of their speed is taken in Mbit/s or Gbit/s.
C) Gateway
A gateway connects LANs to WANs
D) Routers
Routers store all connected device’s IP Addresses.
They use these to forward network traffic using the fastest route.
E) Switch
A switch has many ports that can be used to connect devices with wires.
F) Booster
A booster amplifies a network signal so that it can cover larger distances.
G) Server
A server is a computer that shares its resources with connected devices.
Devices connected to a server are called clients.
Types of servers include:
1) Authentication Server
2) Application Server
3) File Server
4) Print Server
5) Web Server
2) Web Browser – A web browser takes requests and guarantees access to Web Servers
A) Peer-to-peer network:
This is where the devices are connected to each other and share resources without a server.
B) Client-server network
This is when all the devices are connected to one server.
2) Firewalls
These are found on gateways and control what can enter the network of the LAN (like a cell membrane)
3) Encryption
This is when data is scrambled so that unauthorized users are unable to understand it.
A) Caesar Cipher
All data is shifted by a certain number of units to the left. The number of units it’s shifted is the key. This is,
however, easy to crack.
5) Transaction Logs
These keep track of all exchanges of data happening on the network.
7) Backup
There are several risks to data and information, each detailed below:
If a user who is not allowed access to a network access it, it’s known as unauthorized access.
Cybercriminals can gain unauthorized access either by trying to guess logins, or by using computers/AI that
guess approximately 1000 logins per second.
The botnets are installed by criminals looking for the weakest, most vulnerable devices within the network. As
soon as they are infected, they infect the rest of the network.
Malware can show messages, delete files, install programs, or even reprogram systems.
Keyloggers
are an
example of
spyware.
This could be done through: Pressing a key accidentally, Loss of power unexpectedly, Formatting media on the
wrong storage device.
A. Phishing
Phishing is the criminal activity of sending emails or having a website intended to trick someone into giving
away personal information (such as credit card details or computer passwords).
One type of phishing is spearing phishing – this is when the messages are more personalized and targeted to a
small number of people.
B. Pharming
Pharming is like phishing, except this is not through messages, but rather by creating fake versions of trusted
websites.
I) Internet traffic being sent to the real website is reforwarded to the fake website. This is done by
altering the domain name servers. A domain name server is a computer connected to the
internet that translates domain names, for example pearson.com, into IP Addresses.
II) Fake URL – Sometimes criminals will spell their fake website’s URLs as a misspelled version of
the original. Therefore, when the users mistype the original URL, they are directed to the fake
one. For example, www.britishschoolofbahrain.com is the original website, but
www.britiahschoolofbahrain.com is the pharmed website.
As mentioned in Chapter 5, there are several ways to protect data and personal information.
This could be: Firewalls, Encryption, File Access Rights, Transaction Logs, or even Passwords/Pins/Biometrics.
Remember passwords must be: More than 8 characters long, mix of letters, numbers and symbols, changed frequently,
upper and lowercase, something not known (e.g. don’t use birthday).
CAPTCHA – A computer system which can identify whether a user is a human or a computer.
CAPTCH may ask users to either enter text, choose images or solve puzzles.
reCAPTCHA is a form of CAPTCHA but they use extracts from books, and the typed data is used to type up eBooks.
Anti-malware – prevents malware from accessing or operating on computer scans or computer files in real time and
allows users to scan files, folders, or whole systems.
Anti-virus: works just like virus prevention in real life. Files being downloaded are constantly checked for signs of virus
definitions. If matches are found, the file is quarantined so that it cannot be run.
This software must be upgraded regularly, as viruses are being updated regularly.
HTTPS:
Users should also look out for websites and make sure they follow the HTTPS format (Hypertext Transfer Protocol
Secure) which keeps communications private and provides security for users’ accounts.
HTTPS authenticates payments through a payment server, and provides encryption using SSL (Secure Socket Layer) and
TSL (Transport Layer Security)
Backup Procedures:
Online is safer but slower, while local is faster but at a higher risk of loss.
2 – Differential Backup: Creates a copy of all files that CHANGED SINCE THE LAST FULL BACKUP ONLY.
3 – Incremental Backup: Creates a copy of files that CHANGED SINCE THE LAST PREVIOUS BACKUP (WHATEVER IT WAS)
When entering data from bank cards you may be asked for: Card Number, Card Security Code (CSC), Expiry Date,
Cardholder Name
Contactless payment has also been introduced using NFC and RFID, however it is less secure.
Information &
Virtual Learning Environments
Services
Teachers
Individuals
Collabaritive Working
Working Practices
Flexible Working
Collaborative Working:
The internet allows colleagues to connect and work with each other in real time, making them more efficient.
BENEFITS DRAWBACKS
More than one person Expertise is shared It can be difficult for lots of people to agree
works on an individual
task Employees can check on each other’s work It’s to difficult to coordinate a large team
This type of work is completely based upon meeting the employee’s needs.
For example, employees can decide their working hours, or can work from home.
This has been made possible due to the internet, allowing users to access work from anytime and anywhere.
BENEFITS DRAWBACK
Employees can work at a time that’s right for them and There is not much face-to-face interaction, reducing their
take breaks when needed understanding of each other
Employees can fit their work around family life Work and time may not be managed effectively
Employees can access up to date information Employees may overwork themselves (Exhaustion)
Employees can work from anywhere The required resources may not be accessible.
1. Keep your personal information private and don’t share it online: This includes things such as Location, School,
Phone Number, Real Name, Photos, and Mailing Address or any Password of any kind. To stop strangers viewing
your profile, adjust your privacy settings.
2. Block any offensive messages of friend requests. This includes age-inappropriate content or suspicious
links/attachments.
3. Report anything inappropriate. Tell adults, or report on social media anything that upsets you or any sort of
grooming behavior.
Edexcel IGCSE ICT Revision Notes
Digital Footprint
Digital footprint is all the data that a user creates online, which is recorded and stored.
Any content you make, or post can easily be accessed by anyone on the internet and can easily be shared or recorded.
Therefore, you should always think carefully before posting any sort of content, and consider whether it’s appropriate to
be out in the public.
Using the internet to work from home has been made possible due to advancement in computer software capabilities
and LANs. Online working from home has both advantages and disadvantages for both organizations and individuals.
BENEFITS DRAWBACKS
Can spend more time working/resting Suffer from a lack of social interaction
Impact on Individuals
No need to wear uniform Feel disconnected from the company
Can attract a talented & motivated work force Difficult to manage and support employees
More efficient work from home Might not work as hard from home
- Allowing them to transfer a copy of the organization’s data to home via email.
- Providing remote access to the data stored such as by using a VPN.
- Storing data on another company’s error and providing access to that data.
All the above makes the data more vulnerable and likely to be accessed by unauthorized users.
Positive Impacts
Impact of the Interent on
Security Issues
Negative Impacts
Greater Competition
Security Risks:
- Allowing them to transfer a copy of the organization’s data to home via email.
- Providing remote access to the data stored such as by using a VPN.
- Storing data on another company’s error and providing access to that data.
All the above makes the data more vulnerable and likely to be accessed by unauthorized users.
The unauthorized users can gain access through one of the following:
Digital Divide – The gap between people who have access to digital devices and the internet and people who don’t.
Causes of the
Digital Divide
Basically, look back at the first page of this document, and think of the opposite of all of that.
However, it may be argued that the limited access to the internet allows for stronger communities.
How has access to the Internet and various other networks impacted societies?
1. Media and Representation has improved as people are now able to freely voice their own opinions.
2. User-generated Reference Sites have risen (such as Wikipedia) making truth, knowledge and accuracy less
reliable and there is a limited number of experts and editors on such platforms.
3. Monitoring of Social Networks has also been adjusted, as people are easily able to organize riots and strikes.
4. Police and Moderation have improved through systems such as CCTV which helps in reducing crime rates.
5. People gather for Positive Movements such as the Digital Humanitarian Movement.
Information rich – People with good access to information provided by communication technologies. Information poor
is the opposite of this.
This gap was always there as not everyone had access to newspapers, books or education, but has now increased.
People who do not have access to the internet may use alternatives such as SMS to communicate or even receive simple
updates.
People’s ability to think and make decisions has been affected as they spend more time in the virtual world rather than
the real world.
Though the internet can be used for communication, moreover than not it leads to isolation from families and local
communities.
Some people argue that social media makes friendships meaningless, because on social media, even strangers can be
labelled as friends.
An online community is a group of people with a shared common interest who communicate online. There are 7.
- A target audience.
- A function – What it does for people who use it.
- Features – Aspects that allow it to carry out its function.
-
Social Online
Online Gaming
Networking Workspace
Function: Allows members Function: Allow members
Fucntion: Members
to socalize and connect of the community to play
collaborate for the
through shared interests multiplayer games
purpose of work
and relationships together
Features:
Features:
- Profiles Features:
- Share, Comment, Friend &
Follow - User Profiles
- Status Updates and Posts - Game Information & - Cloud Storage
Manuals
- Tags - Chat Rooms
- Groups - Experience points:
Players can compete - Editing Permissions
- User Suggestions based on level of - Comments
- Reactions & Ratings experience - Virtual Meeting
- Notificatoions - DIscussion boards Platforms
- Third Party Integrations - Statuses - Contact Lists
- Analytics (Online/Inactive) - Shared Calendars
Details on some of these are - Notifications
on the page 3
Wiki Features:
- Member Accounts
Features: - Edit Buttons
- Structured Language
- Log-in Systems - Search Tools
Features:
- Gradebooks
- Feed/Timeline
Forum Function: Members of - User Accounts
- Area to submit the community come together
assignments - Text Editors
for structured discussions
- Multiple choice - Upload Tools
quizzess/Atumoatic Forum Features: - Ratings, Tags &
grading Comments
- Communication Rooms - Groups - Third Party Integration
- Ability to share audio, - Moderators,
video or even web links. Adminstratros
- Posts & Threads
- Ratings
- Private Messages
Social networks can be used as powerful marking tools as they contain a large amount of information regarding people’s
interests.
1. Social networking companies store information regarding users in databases and analyze it.
2. This information is then sold to advertisers.
3. Advertisers can now use this information to specifically target relevant sponsored posts to match members.
Targeted marketing is advertising that is matched to internet users based on their attributes, such as their age group or
their gender, or their internet browsing history.
This can be used by individuals and organizations to find the most effective methods of communication so that they can
grow and reach.
Third Party Integrations are basically using links to social networking sites so that people can easily share information.
For example, The British School of Bahrain’s website contains a link to their Instagram page. It also contains a link to
share their blogs as a Tweet on Twitter.
Moderators – Members who have the right to allow or block posts or members.
Administrators – Members with the same privileges as moderators, except they can also promote members to be
moderators or demote moderators to be members.
Word or URL Censoring – When posts are submitted, they are scanned for inappropriate messages and URLs. If
found, the post is rejected or sent to moderators.
Rules and Policies – Tell members what’s allowed and what isn’t. If rules are broken, moderators can send the
member messages through private messages.
Report/Flag – Allows members to tell moderators if other members have broken the rules of the forum.
Cyberbullying:
Features:
This should be reported at anytime observed, whether the
user is the victim or witnesses it happening.
- Social Networking
Features
- Thrid Party Integration
- Tags
- User Accounts
Data Protection:
When storing data, there are certain conditions organizations must abide by. Similarly, individuals have rights regarding
what happens to the information.
Data is not kept for longer than necessary Object to decisions taken by automated means
All is handled according to people’s data protection rights Have inaccurate data rectified and claim compensation
Some countries have agreements so that data can be transferred between them with adequate protection, like within
the EU.
Copyright Legislation:
Copyright is a legal power that provides the creator of an original work with the sole authority to use and distribute it.
When you pay for something, you get the right to access it, however, that doesn’t give you the right to distribute it or
create copies of it. For example, if you buy and e-book, it’s illegal to create copies and distribute them as if your own or
free.
Monitoring Individuals:
Individuals can be monitored in several ways, for example, their movement or communication.
Monitoring Movement:
1. CCTV (Closed Circuit Television) which could have facial recognition software
2. ANPR (Automatic Number Plate Recognition) is used to track cars in streets.
3. Monitoring the use of ID cards, travel cards, passports and card transactions.
4. MAC / IP Address Identification
5. GPS by apps
Individual’s online communication and communication software can also be tracked for the same reasons listed above.
Sustainability Issues:
Use a lot of power from non-renewable Build the data centers in cold
Cooling Systems for Data Centers
energy environments
Education
When thrown away the poisonous
Poisonous Substance Recycling
substances leak away causing health
(Bromine, Mercury, Chlorine) Laws
risks
Harmless Alternatives
Primary Source – You own the data. (Photos you have taken, Articles you have written)
Secondary Source – Someone else owns the data and you are using it (Radio Program, TV, Books)
They do this by comparing entered information to records in a database and give the most relevant results.
- Use Keywords
- Use Search types (specify the type of information you are looking for)
- Use Search tools (Tools to help filter the results)
- Use Searcy Syntax
o AND is (+)
o NOT is (-)
o PHRASE MATCHING is (“”)
Some search engines also use autofill and suggestions. This could either be by closely matching results that are
frequently searched, or close to the searches on the database. It could also be depending on the user’s browsing history.
You should also make sure you are aware of the copyright legislation behind the data you use.
- Credit the source and state that the information isn’t yours
- Rephrase it in you own words by understanding the information.
- Include URL, Author’s Name and Publication Date
BOOKING SYSTEMS:
Educations and
Tickets can be bought for several things including
Training transport tickets, or even for leisure and
Online Services entertainment. E-tickets can be sent via email.
These can include: Ratings of buyers are found on these to check for reliability and payment
speed.
- Weather
- Sports There are also ratings for sellers, again, for reliability and sending times.
- Stock Markets
- Currency Values Alerts and Notifications are also available.
Access to online services has improved people’s lives, in some cases changing their lifestyle at a whole. The advantages
of several online services are listed below:
ONLINE BANKING
- People become less patient as they are used to the immediate availability of information.
- People become more isolated as detached from real-world communities and from face-to-face communication.
- Less need to memorize facts due to immediate availabilities.
- People become accustomed to skim-reading, and don’t truly understand all the information/facts.
- Improved communication.
- Access to global markets.
- Access to global workforce.
- Use of big data to understand customer behavior.
- The way in which the organizations secure business information changes.
- Increased competition.
This data can be tracked. Usually, the transactional data is stored in cookies.
Cookies – Information that a website leaves on a user’s computer so that the website will recognize that user when they
use it again.
Session
•Only stored until a webpage is closed.
Cookies
•Used to record information about user's use of the internet over time.
Presistent
•Used to keep a user logged in.
Cookies •Allo advertisers to track data.