0% found this document useful (0 votes)
198 views44 pages

Ict Revision Notes.

Hi

Uploaded by

sumayamsuleiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
198 views44 pages

Ict Revision Notes.

Hi

Uploaded by

sumayamsuleiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

COMBINED ICT NOTES.

Chapter 1 – Digital Devices


1.1 Types of Digital Devices

Mainframe computer – Large, powerful computer that carries out complex tasks (such as statistical analysis) rapidly and
can be used by many people simultaneously.

Microprocessor – Controls what the computer does. It takes data as input, processes it, and gives out an output.
e.g. Washing Machine, Television, Household appliances.

Laptops and desktops are types of personal computers. Laptops can be used as desktop replacements.

Single Board Computers – Affordable computers used in areas such as:

1) Education
2) Embedded Computing – Computing hardware that’s fixed in position and carries a specialist task.
3) Physical Computing – Interactive systems that can detect and respond to the surrounding environment.
Embedded computing can be found in calculators. Physical computing can be found in robotics. They are total
opposites.
Wi-Fi – A way of
For mobile phones to connect to the mobile phone network, they need to have a SIM Card. connecting
computers or
SIM = Subscriber Identity Number, so it is used to identify the device on the mobile phone network. machines to a
network or the
Specialists Phones – Are phones with special features that meet the user’s needs. internet using radio
signals.
This can be an “accessibility need” or something like with an "Emergency feature”.

Smartphones – In addition to the features of a mobile phone, they have Wi-Fi Connectivity and can access the
internet.

Additionally, they have features from other devices such as cameras and hand-held game consoles

Their operating system is more complex, and hence they use more energy, and require charging sooner
than other mobile phones.

Tablets – Slightly bigger than smartphones but carry out mostly the same functions.

Some more digital devices are listed in the table on the next page:

Edexcel IGCSE ICT Revision Notes


Digital Device Purpose Detailed Use
Light sensors capture light falling on the camera lens.
Camera To take still photos
Quality of image depends on:

- Quality of the lens


Camcorder To take moving photos (Videos) - Quality of the Image processor
- Resolution of the sensor

Some use motion sensors


Enable users to play video games on a Wireless controllers
Game Console
television screen. Virtual reality controllers
Handheld – Less storage so lower quality games

Quality of TV depends on resolution. HD / UHD


Manufacturers only present the vertical pixels.
Smart TVS have apps and can connect to Internet.
Televisions
Personal Video Recorders – Records broadcasted
Home Entertainment Sound Systems
content so that I can be watched later.
Systems PVR
Blue Ray/DVD Players
Set top box – Device that sends video and audio
received from a broadcaster to a television.

DVD can’t play Blu-Ray but Blu-Ray can play DVD.

Content could be from the Internet.


Connected to a TV to present audio and Or on locally stored network
Media Players video.
e.g. – Apple TV / Google Chromecast Portable ones are small and compact and have flash
memory.

Navigation aids – These calculate the best routes with shortest distance, least traffic and shortest duration of travel.

The use information from GPS and GIS:

- GPS (Global Positioning System): Multiple satellites will cross their radio signals to pinpoint your location. This
does not need an internet connection.
- GIS (Geographical Information System): Needed to render the maps, roads houses etc. This does require an
internet connection.

Multifunctional devices – A device that can perform a range of different functions.

e.g. – A phone can take pictures, send messages, make calls, and even work as a game console.

This is a result of convergence.


Edexcel IGCSE ICT Revision Notes
Convergence – When the designs of devices change so that they become similar to another

e.g. – Laptops can now flip to form tablets.

1.2 Features of Digital Devices

1) Portability
A portable device is one that is easy to carry and move around.

2) Performance
High performance means high speed.
High speed means it can carry out or “process” information quickly.
This required a good processor and a large RAM (discussed in Chapter 3)

Otherwise virtual memory may be used.


Virtual memory – Storage used by the processor once the space in RAM has run out.
This results in much slower task execution.

3) Storage
More storage means more files and programs can be stored.
Storage may also affect performance (specifically in the case of virtual memory)

4) User Interface
This is basically the method by which the user interacts with the system

a) Command Line – By typing in commands (Complicated and Inefficient)


b) Menu-Driven – By choosing from a list menu, ATMS have this, This may not give the user exactly
what they want
c) Graphical User Interface – Uses windows, icons and menus. Very effective but requires high storage.
d) Voice Driven – By speaking e.g. Siri
e) Gesture Interface – By swipes/finger movements

5) Connectivity
Devices can share date through connecting to each other either wirelessly or using a wire.

6) Media Support
Items such as memory cards can be read and written.
Some devices do not have built-in media support and to they must use external devices

7) Energy Consumption
Low energy consumption = Longer battery Life = Save customer’s money + Present social responsibility

8) Expansion Capability
Some PCs allow users to install additional components through expansion slots.

9) Security Features
Edexcel IGCSE ICT Revision Notes
a. Software Security:
Locks through PIN/Password
Swipe/Patterns
Longer/More random and complex = Better
Biometrics

b. Physical Security
Specialists slots/Locks

1.4 Input & Output Peripheral Devices

Peripheral device – A device that can be connected to a computer to either give input or output or for storage.

Input Devices include:

- Keyboards
- Pointer devices (Mouse, Tracker ball, Track Pad, Joystick, Graphics tablet)
- Scanners
o OCR – Scans text/numbers (Optical Character Recognition)
o OMR – Scans mark (MCQ Exam Papers etc.) (Optical Mark Recognition)
- Barcode Scanners
o Linear – On food products etc.
o Matrix (QR) – Hold more information + Scanned at any angle.
- Webcam
- Microphones
o Diaphragm moves when air hits it.
o This produces and analogue electrical signal.
o Electrical signal is converted to digital signal using the sound card.
- Touch Screen
o Resistive – Force is applied by fingers.
o Capacitive - Electrical signals are transferred from fingers to screen
- Biometric Scanner
o Includes: Iris, Fingerprint, Face and Voice
o Fingerprints can be of different types – Arches, Loops and Whorls
o Iris is the most secure
o Advantages – Easier / Harder to trick / Faster transactions / No language barriers
o Disadvantages – Stores personal info / Expensive / Some feel uncomfortable
- Card Readers
o Magnetic Strip – Least secure as no pin is required.
o Programmable Chip – Data is only readable when the correct pin is entered.
o Radio Frequency Identification and NFC – Like Apple Pay. Uses wireless communication.
▪ When scanned, ID is linked to database records
- Sensors
o Input data from the physical environment
o Benefits – Dangerous places / Continually monitor / Remove human error / Easily analyzed data

Edexcel IGCSE ICT Revision Notes


Output peripherals include:

- Monitors
o Quality affected by: Screen size + Resolution + Energy Efficiency
- Printers
o Dot Matrix – Punches holes through paper. Very Loud. Very Slow. Cheapest cost per copy. Can carbon
print.
o Inkjet – Motor moves printer head across a page. Cartridges of spay in on the paper through the nozzle.
Quick. Expensive per copy. High quality
o Laser – Drum emits an electrical charge. (Like physics photocopier). Fastest. Most Expensive. Medium
cost per copy. Highest quality.
o 3D Printers – Real-life version of digital models
- Plotters
o Used by cartographers
- Data Projector
o Quality depends on: Zoom Functionality + Quality of Lens + Light Bulbs + Resolution
- Speaker
o Mono sound – Sound produced from one side.
o Stereo sound – From two different sides.
o Surround sound – From all different sides.
- Control Device
o Components of a system that make something happen in real life.

1.5 Types of Peripheral Devices – Storage

It is important to differentiate between storage medium and storage device.

Storage medium is what holds the data and what the data is read from.

Storage device is what reads the data and allows it to be presented on the device.

e.g. DVD Disk is the media while DVD drive is the device.

Secondary storage is non-volatile (data is not lost when power is lost)

It is used for:

- Storing documents/files for future use


- Storing an application, reading to be loaded into RAM when needed
- Virtual Memory

Devices:

There are several kinds of storage devices:

1. Hard Disk Drive. This contains hard disk media and is connected to the motherboard internally or externally.
2. Solid State Drive (Flash drives). This contains solid state medium and is like HDDs.
3. Optical Disk Drives. These contain Optical Disk Media. They have backwards compatibility.
Edexcel IGCSE ICT Revision Notes
Media:

1. Hard Disks

A hard disk is made up of a spindle and concentric platters around it as well as a read/write head.
The speed of the hard disk is determined by:
a) The speed of the concentric platters (Revolutions Per Minute)
b) How fast the read/write head moves on the platters.

The read/write head does two different things when reading and writing:

Reading – Changes magnetic field to electric current.

Writing – Changes electric current to magnetic field.

The seek time is the time taken by the RW head to locate the area on the platter where it needs to read/write
data.

2. Optical Media

MEDIA DATA STORED METHOD

Laser writes on plastic below layers of aluminum and


CDS 700 MB
acrylic

4.5 GB One Sided Shorter wavelength of red laser and hence more
DVDS
18 GB Two Sided data

Even shorter wavelength of violet laser and so


25 GB One Sided
Blu-Ray highest data storage
50 GB Two Sided
Has scratch -protection!

Edexcel IGCSE ICT Revision Notes


All of them can be recordable (R). CD and DVD can be writable (W). DVD can be written, erased, then written
again (RE)

3. Flash Media

There are no moving parts and so its energy efficient and portable

4. Magnetic Tape

In the past it was only used for music but now its used for both

How does storage media store data?

All storage use media use binary – bits of 0 or 1

Hard Disk – Change the charge on the platter to positive/negative to represent 0 or 1

Optical Media – Tiny bumps on their surface to represent 0 or 1.

Laser light shines on the surface.


The read head moves across the spinning platters.
Light is reflected if it lands it represents 1.
Light is scattered if it exists it represents 0.

Flash Media – Different levels of charge to represent 0 or 1 in tiny individual cells.

Magnetic Tape – Change the charge on tape to positive/negative to represent 0 or 1.

Edexcel IGCSE ICT Revision Notes


CALCULATIONS

8 bits = 1 byte!

1 KiB = 1024 bytes

Example:

Construct and expression to show how many

Bits are in 128 GiB.

1Kib = 1024

1GiB = 10243

1 byte = 8 bits

128 x 8 x 10243

ACCESSIBILITY

If asked about examples if devices for accessibility needs, give the following;

Braille Keyboards – For people with visual impairment

Gesture Interface – For people with low mobility

Edexcel IGCSE ICT Revision Notes


Chapter 2 - Software
1.3 – Software

There are two main different kinds of software, system software and application software.

System Software – Allows users to manage, configure or operate the operating system.

There are two main types of System Software:

1. Utility Software:

This allows the user to maintain the operating system and carry out configuration tasks.

Types of utility software include:

1. Backup
Creates a copy of files and data.

2. Defragmentation
Data is found on a disk, and so it may be highly spread apart, or sorted out of order, or in other words, it’s
fragmented.

Defragmentation reorders the fragments of the data so that they are closer together and easier to locate.

Usually, this happens automatically.

3. Compression
Compression decreases the size of data files to reduce the amount of space taken up by storage.

This is done by deleting extra bits of data.

4. Formatting
Formatting makes all data on a disk unreadable.

2. Operating System

The operating system allows users to control the computer hardware.

The operating system can be of two different types.

Edexcel IGCSE ICT Revision Notes


A Network Operating System

This is where multiple users use the same device/OS.

A network operating system must:

- Separate user accounts through usernames and passwords


- Separate user files and software
- Access to networks servers and shared peripherals

Therefore, there are certain features that allow the users to separate the systems.

A) Resource Management
This makes sure certain aspects of hardware are available when required.
For example, if Zoom needs the webcam, the Resource Management would make it available to
Zoom.

B) Memory Management
This makes sure enough RAM is available to the applications that require it.

C) Print Spooling
Creates an order for documents to be printed.
For example, when a teacher sends a document to be printed, it would be in a queue for all
documents waiting in line to be printed by other teachers.

D) Security
Separate usernames and passwords, which can be used and sent to authentication software to gain
access.

Single user network – This could also allow the user to change the user interface.

Application software – Software that helps a user create a digital product or carry out specialist tasks. For example, a
presentation, an image a website etc.

Apps can be downloaded from servers on the internet or directly onto the local storage of the device.

Below is a table giving examples of several application software and their functions.

Office productivity software is software that allows a user to carry out work-related tasks.

Application Suites contain applications that have the same user interface and can share files and data between each
other.

Edexcel IGCSE ICT Revision Notes


SOFTWARE USED FOR
Word Processing Creating documents, reports, letters etc.
Spreadsheet For recording numerical data, specifically to carry out calculations
Presentation Software To prepare slides to present, can include animations/transitions, videos etc.
Desktop Publishing Same function as word processing but is more complex and has more features.
Database Store and data and information through queries, tables, forms, and reports.
Web Authoring To prepare files in HTML, so that they can be shared with webservers/intranet
Image Editing To edit graphics by adding shapes lines etc.
Photo Editing To manipulate photos, such as recoloring, add transparency, resize/rotate.
Sound Editing To adjust tone, tempo, layers, or even mute certain files.
Project Management To manage resources and organize large projects and keep track of them
Control Applications Could be to control home automation systems, or in areas where humans can’t be

For presentation software, speaker notes can be added to help guide the presenter through their presentation.

Tempo in sound editing is the speed at which the track is going.

For project management:

They can be used to allocate tasks, track resources and their orders, assign to employees/team members.

1- Critical Path – Shortest route to completing a task.


2- Timeline – All the events to be done and required demonstrated.
3- Milestone – the deadline for a task (date it must be completed by)

Communication Software – Provides remote access to systems that allow users to transfer information and data.

- Social Media
- Websites & Email
- SMS (Short Messaging Services)
o This doesn’t require an internet connection.
o You cannot send images/audio or files on it.
o There is a limit of 160 characters to be sent.
- MMS (Multimedia Messaging Services)
o This doesn’t require an internet connection.
o You can send images/audio or files on it.
o You can send more than 160 characters.
- Instant Messaging
o This requires an internet connection.
o You can send images/audio or files on it.
o There is no limit.
o Has extra features such as seeing the user’s activity status, and whether they read messages.
o Examples include WhatsApp.

Edexcel IGCSE ICT Revision Notes


Software Licensing:

A software license is the agreement between the developer/producer and the user.

Just remember, source code manages how a software works.

1. Open-Source Software
Everything is made available to the user. They can distribute it and make changes and resell it. This includes the
source code, so they can make any changes/redevelop the software.

2. Free Software
This is software where everything is made available to the user. They can distribute it and make changes and
resell it. However, the source code is not available.

3. Proprietary Software
Proprietary software is a license where the user is not allowed to distribute or edit the software under their
own name. E.g. Microsoft Office.

4. Freeware
This is a type of proprietary software that is offered for free.

Software Updates:

Software updates need to be carried out for a few reasons:

1. Fix security vulnerabilities and bugs.


2. Introduce new features.
3. Improve compatibility.
4. Improve accessibility and usability features.
5. Improve performance.

It’s important to note that when updating software, there is a chance of data being lost.

Hence backup should be carried before updates, and all systems should be checked so that we make sure they are
compatible with the new software.

Edexcel IGCSE ICT Revision Notes


Chapter 3 – Memory & Processors
1.6 Memory

Memory is accessed faster than secondary storage.

Memory is used to store instructions so that the processor can quickly fetch, decode and execute them.

There are three types of memory:

- RAM (Read Only Memory)


- ROM (Random Access Memory)
- Flash Memory

RAM (Random Access Memory)

This is how you should understand the difference between secondary storage, RAM, and the processor.

Secondary
RAM Processor
Storage
Fetches, Decodes and Executes
Programs currently in use instructions from RAM
Programs not in use

RAM stores instructions and programs currently in use.

RAM is volatile – meaning that when power is lost, all the data stored on it is also lost.

The size of the RAM impacts user experience.

A bigger RAM can hold more opened files at the same time without the need for virtual memory.

Virtual Memory – This is created when the RAM is full. An area of secondary storage is used to store data
instead of RAM. This means the processor needs to fetch data from the secondary storage rather than the
RAM which massively impacts the suer experience by slowing down the device’s performance.

If files that are not in use however are closed, space is emptied up in the RAM and data is moved back there.

Here is an example situation:

A student has 16 chrome tabs, an Excel sheet, his Chemistry Lesson PowerPoint and a Word Document opened. However,
he only has 4GB of RAM.

Therefore, there is no space for PowerPoint and Word Document. They are moved from the RAM to the Secondary
Storage. As a result, the student experiences massive delays when navigating with the PPT and Document.

Edexcel IGCSE ICT Revision Notes


ROM (Read Only Memory)

Unlike RAM, ROM is non-volatile (If power is lost, the data isn’t lost)

ROM can be used for two main purposes:

- Store data for single use computers such as calculators and digital watches
- In PCs to store information needed to boot the system

Computers cannot swap in and out instructions from ROM.

However, the contents of the ROM can be adjusted in a few types of ROM:

- PROM (Programmable Read Only Memory) – Data can be written, however only once.
- EPROM (Erasable Programmable Read Only Memory) – Data can be erased and re-written with exposure to UV
Light.
- EEPROM (Electrically Erasable Programmable Read Only Memory) – Data can be erased an re-written if a high
voltage is applied to a certain pin in the ROM

EEPROM eventually developed to form flash memory.

Remember, ROM stores permanent data and cannot be upgraded, while RAM stores temporary data and can be
upgraded.

Flash Memory

Flash Memory is a type of EEPROM.

It has no moving parts. Therefore, it is portable and has a low power consumption.

Due to that it is used in devices with SDs such as laptops.

1.7 Processors

A processor Is made up of the Central Processing Unit of a device (CPU)

In some cases, there is more than one CPU, by which we then call each one a core. For example, a quad-core has 4 CPUs.

Processor cycle – The cycle by which a processor fetches from memory, decodes and executes instructions.

Processor speed is measured in clock cycles per second.

A clock cycle per second – The number of times in one second that a processor can carry out on or more instructions, (In
simple terms, the number of processor cycles carried out per second). They are measured in Hertz (Hz)

The number of instructions taken per cycle also accounts for the speed.

Edexcel IGCSE ICT Revision Notes


Chapter 4 – Digital Communications
2.2 – Factors Influencing the Choice of Digital communication in a Network

Speed & Volume of Data Transfer

To begin with, we must understand a few important definitions:

1. Bandwidth – Amount of data transferred per second.


2. Latency – Time it takes data to travel between two devices.
3. Buffer – Area of storage used to temporarily store data, specifically when streaming.

Typically, users want a high bandwidth and low latency.

Impact on User Experience:

Good (High) Bandwidth means very rapid uploads and downloads, as well as complex tasks happening much quicker.

Good (Low) Latency prevents lag from occurring, and in times of watching live events online, there would be no delay
between real-time content and presented content.

Streaming:

Remember that when streaming the content being streamed is not fully downloaded.

Rather, as you keep watching, the buffer fills up with more and more data being added.

If the buffer has no data in it, the video being watched will stop until the buffer plays again.

Example:

If you’re watching Loki as soon as you open it content will begin to fill up in the buffer.

If you reach the 7th minute and eventually it stops, that means the buffer is empty (there is no content to play) and hence
you have to wait till the buffer refills with enough data to present.

Data transfer is also affected by:

- Method of Transfer (Wired/Wireless)


- Interference
- Blockages
- Distance

Edexcel IGCSE ICT Revision Notes


2.1 – Types of Digital Communications

Device to Device Communication

Devices can connect to each other in several ways, whether wirelessly or in a wired manner.

Examples include: HDMI, USB, Minijack, Bluetooth

Network Communication

When two or more devices are connected to each other, a network is created.

There are 4 major types of networks:

1. LAN (Local Area Network)

This covers a small geographical area.


School devices are connected through a LAN.

2. WAN (Wide Area Network)

A WAN covers a larger geographical area than a LAN.


The internet is the largest WAN.
WANs usually connect LANS to each other.
For example, a multinational company may connect each country’s LAN through a WAN.
Due to its nature, transfer speeds on a WAN are slower than in a LAN.

3. PAN (Personal Area Network)

This is a group of devices connected near an individual user.


An example: iPhone, iPad and MacBook all connected to each other on a desk. Or watch, earphones & phone.
If the network is fully wireless, we call it a WPAN (Wireless Personal Area Network)

4. Tethering

This is when a host device shares its mobile broadband with another device, so that the other device uses its
broadband.
Basically, enabling 4G and 5G.
Enabling tethering means that the original user has less bandwidth and so will experience slowdowns. This is
because broadband is shared equally between both devices.
Remember, when using Broadband, a device uses an Internet Service Provider to connect to the internet.

Edexcel IGCSE ICT Revision Notes


Methods by which Digital Devices Communicate:

Digital devices can share and receive data with each other through several different ways detailed below:

SATELLITE Radio Waves GPS / TV / Telephone / Military


BROADCAST Radio Waves Television / Radio Shows
WIRED Electrical Signals Networking / Peripherals
WIRELESS Radio Waves Networking / Peripherals

1. Satellite Communication:

Digital devices have antennae.


Signals are sent from the device to the satellite. The satellite then sends them to the device, which receives
them from the antennae.

Advantages:
- They are not affected by power shortages.
- They are accessible all the time.

Disadvantages:

- Affected by weather and atmospheric conditions.


- Cannot go through solid objects, so in cities with tall buildings they are not efficient.

They are used in –

GPS – Several satellites allocate your location and pinpoint


where the rays cross.

TV – DVB-S is used within the TV. A broadcaster sends a


signal to the satellite, which then sends the signals to be
received by antennae of households who send it through
to a set-top box.

Telephone – In remote locations.

Military – In communication systems such as the Global


Command and Control System.

2. Broadcast Communication:

Analogue Broadcast
- A broadcaster transmits analogue signals that are received by antennae of houses.
- The signals are then passed through a wire which converts the analogue signals into images/audio.

Edexcel IGCSE ICT Revision Notes


Digital Television
- This works just like DVB-S except the signals are all
transported within Earth, nothing goes outside.
- The same antennae as that of Analogue Broadcast can be
used.

3. Wired Communication:

There are several types of wired communications:

HDMI Digital Video Connections

S/PDIF Digital Audio Connections

Minijack Personal Headphones

USB Storage Transfer

Ethernet Networking

Ethernet – A network connectivity standard that provides a way for computers to communicate.

4. Wireless Communication:

Just like wired communications, there are several wireless communication methods:

- Wi-Fi
- Bluetooth
- 3G and 4G
- Infra-red
- NFC

WIRED WIRELESS
Faster Lower costs (No need for cables
More Stable Less Maintenance
More Secure (No tripping hazard)
Less Mess
More Portable

Edexcel IGCSE ICT Revision Notes


Chapter 5 – Networks
2.3 – Requirements for connecting to a network, including the internet

There are requirements for devices to connect to a network so that they can abide by the protocols.

Devices are identified on a network by either one of the following:

1. IP Address

Can be assigned by an administrator or by a DHCP (Dynamic Host Configuration Protocol)


IP addresses are not fixed and depend on the network you are on.

There are currently two types of IP Addresses:


- IPV4 – Uses 8 numbers only. They are separated by dots.
- IPV6 – This is the newer one. It is made up of 8 groups of 4 hexadecimals. They are separated by colons.
Hexadecimal – A base-16 number that uses numbers 0 – 9 and letters A - F

IPV6 was developed because the number of devices was growing faster than the number of physical users.

2. MAC Address

A MAC address is fixed, unlike and IP Address.


A MAC address is made up of 6 pairs of numbers/letters.

The first three pairs – Unique to the manufacturer of the device.


E.g. – All Lenovo devices have the same first three pairs.

The second three pairs – Unique to the device and its NIC
E.g. – Every individual Lenovo device has a different second three pairs.

MAC Addresses can be useful for the following:

1. Identifying devices on a network (E.g., in malls when they only give you a certain amount of Wi-Fi time. If
you log in again you are rejected because your MAC Address is identified)
2. Tracking devices on a network
3. Changing device’s access rights to a network
4. To adjust dynamic/static IP Addresses
Since IP Address constantly changes, using MAC Address you can specify a fixed IP Address for a device when
it connects to your network.

3. Device’s Name
This is not the best way as several devices on one network can have the same name
Edexcel IGCSE ICT Revision Notes
Components of Wired and Wireless Networks:

Networks typically have a few standard components which we need to know about:

A) Cables
Cables are used to connect devices in a wired network.
Variations include: Cat5e, Cat6 and even optical fibers.
Measurements of their speed is taken in Mbit/s or Gbit/s.

B) Wireless Access Points (WAP)


These connect devices with Wi-Fi connectivity to a wired network wirelessly.
Nowadays, they are built into routers and can even come with boosters.

C) Gateway
A gateway connects LANs to WANs

D) Routers
Routers store all connected device’s IP Addresses.
They use these to forward network traffic using the fastest route.

E) Switch
A switch has many ports that can be used to connect devices with wires.

F) Booster
A booster amplifies a network signal so that it can cover larger distances.

G) Server
A server is a computer that shares its resources with connected devices.
Devices connected to a server are called clients.
Types of servers include:

1) Authentication Server
2) Application Server
3) File Server
4) Print Server
5) Web Server

Connecting to and Using the Internet

To connect to and use the internet several aspects are needed:

1) Internet Service Provider


An ISP is needed to guarantee access to the telecommunications infrastructure.
These are the companies that mainly structure the internet.

2) Web Browser – A web browser takes requests and guarantees access to Web Servers

Edexcel IGCSE ICT Revision Notes


3) Search Engine – A search Engine allows a user to enter keywords which are compared with the web pages
stored on a database and hence allows the Web Browser to give the most relevant results.
a. Filter Software:
This allows administrators to control users from accessing inappropriate/risky content.
Web pages can be filtered using their URL (Uniform Resource Locator), which is the web address.
They can add to a whitelist or a blacklist.
Whitelist = Allowed Access
Blacklist = Denied Access
None = Automatically whitelisted.

2.4 – Benefits of using a LAN/home network

LANS can be really useful.

There are two main types of LAN:

A) Peer-to-peer network:
This is where the devices are connected to each other and share resources without a server.

B) Client-server network
This is when all the devices are connected to one server.

Edexcel IGCSE ICT Revision Notes


Benefits of a LAN (whether peer-to-peer or client-server):

- Shared files and storage


- Shared peripherals
- Easier Communication
- More Flexibility
- Better Media Usage
- Shared access to the internet

Benefits of a CLIENT-SERVER network:

- Roaming Profiles (Log into you account from any device)


- Control over user access rights by administrators (Less errors likely – safer)
- Centralized Backup (No hassle for individual users)
- Centralized Administration (Entire network easily moderated and kept safe)
- Shared Peripherals (Only need one peripheral e.g., one printer per network)
- Shared Storage & Applications (Each user doesn’t need to individually install applications)

2.5 – Securing data on a network, including the internet


There are several ways networks are kept safe from daily threats.

1) Authentication through Logins

2) Firewalls
These are found on gateways and control what can enter the network of the LAN (like a cell membrane)

3) Encryption
This is when data is scrambled so that unauthorized users are unable to understand it.

There are several methods of encryption:

A) Caesar Cipher
All data is shifted by a certain number of units to the left. The number of units it’s shifted is the key. This is,
however, easy to crack.

B) Symmetric Key Encryption


This is used when data is transferred.
A key is used to encrypt the data before it is sent.
The same key is needed to decrypt the data by the recipient.

C) Public Key Encryption


This is also used when data is transferred.
However now, we have two different keys, forming a key pair.
The public key is used to encrypt the data. Then, there is a private key only available to the recipient, that
decrypts the data.

Edexcel IGCSE ICT Revision Notes


D) Wireless Encryption Protocol (WEP)
This is an extremely basic method of encryption where all data sent out of a network is encrypted using the
same key.
This can easily be decrypted by an eavesdropper (someone who has unauthorized access to a network but
remains within it and “stalks” it)

E) Wi-Fi Protected Access (WPA)


This is the updated version of WEP.
It is more secure because:
- Every single device has a unique key on the network.
- Every data packet sent out is encrypted with a unique key.

4) Virtual Private Networks (VPN)


These allow you to access LANs from remote locations.
VPNs can be beneficial for:

A) Making secure payments (Data is not recorded on VPNs)


B) Staying away from surveillance/tracking
C) Accessing the work network from home
D) Accessing geologically locked content.

5) Transaction Logs
These keep track of all exchanges of data happening on the network.

6) File Access Permissions

7) Backup

Edexcel IGCSE ICT Revision Notes


Chapter 6 – Risks to Data & Information
3.1 - Potential risks to data and personal information when information is transmitted and
stored digitally

There are several risks to data and information, each detailed below:

If a user who is not allowed access to a network access it, it’s known as unauthorized access.

Cybercriminals can gain unauthorized access either by trying to guess logins, or by using computers/AI that
guess approximately 1000 logins per second.

Users may try to gain unauthorized access to use devices as botnets.

Botnets - devices used to spread malware (malicious software)

Malicious software – Software that is created with the intention to do harm.

The botnets are installed by criminals looking for the weakest, most vulnerable devices within the network. As
soon as they are infected, they infect the rest of the network.

Another risk to data and information could be deliberate damage by malware.

Malware can show messages, delete files, install programs, or even reprogram systems.

There are different types of malwares, detailed below:

Keyloggers
are an
example of
spyware.

Another risk to data could be accidental deletion:

This could be done through: Pressing a key accidentally, Loss of power unexpectedly, Formatting media on the
wrong storage device.

Edexcel IGCSE ICT Revision Notes


Criminals can also lose data due to theft. This can happen in a variety of forms:

A. Phishing

Phishing is the criminal activity of sending emails or having a website intended to trick someone into giving
away personal information (such as credit card details or computer passwords).

One type of phishing is spearing phishing – this is when the messages are more personalized and targeted to a
small number of people.

Another type is smishing – this is when the messages go through SMS.

B. Pharming

Pharming is like phishing, except this is not through messages, but rather by creating fake versions of trusted
websites.

This can be done through two main methods:

I) Internet traffic being sent to the real website is reforwarded to the fake website. This is done by
altering the domain name servers. A domain name server is a computer connected to the
internet that translates domain names, for example pearson.com, into IP Addresses.

II) Fake URL – Sometimes criminals will spell their fake website’s URLs as a misspelled version of
the original. Therefore, when the users mistype the original URL, they are directed to the fake
one. For example, www.britishschoolofbahrain.com is the original website, but
www.britiahschoolofbahrain.com is the pharmed website.

As mentioned in Chapter 5, there are several ways to protect data and personal information.

This could be: Firewalls, Encryption, File Access Rights, Transaction Logs, or even Passwords/Pins/Biometrics.

Remember passwords must be: More than 8 characters long, mix of letters, numbers and symbols, changed frequently,
upper and lowercase, something not known (e.g. don’t use birthday).

Another method of protection is CAPTCHA:

CAPTCHA – A computer system which can identify whether a user is a human or a computer.

CAPTCH may ask users to either enter text, choose images or solve puzzles.

reCAPTCHA is a form of CAPTCHA but they use extracts from books, and the typed data is used to type up eBooks.

Edexcel IGCSE ICT Revision Notes


Another important tool is Anti-malware:

Anti-malware – prevents malware from accessing or operating on computer scans or computer files in real time and
allows users to scan files, folders, or whole systems.

Anti-virus: works just like virus prevention in real life. Files being downloaded are constantly checked for signs of virus
definitions. If matches are found, the file is quarantined so that it cannot be run.

This software must be upgraded regularly, as viruses are being updated regularly.

Anti-malware also includes Anti-spyware and Anti-adware.

HTTPS:

Users should also look out for websites and make sure they follow the HTTPS format (Hypertext Transfer Protocol
Secure) which keeps communications private and provides security for users’ accounts.

HTTPS authenticates payments through a payment server, and provides encryption using SSL (Secure Socket Layer) and
TSL (Transport Layer Security)

Backup Procedures:

Backups can be done on online or local storage.

Online is safer but slower, while local is faster but at a higher risk of loss.

There are three kinds of backups:

1 – Full Backup: Creates a copy of ALL files.

2 – Differential Backup: Creates a copy of all files that CHANGED SINCE THE LAST FULL BACKUP ONLY.

3 – Incremental Backup: Creates a copy of files that CHANGED SINCE THE LAST PREVIOUS BACKUP (WHATEVER IT WAS)

When backing up its better to:

- Schedule and automate backups.


- Do backups at times of low file activity.
- Store in multiple locations
- Use Online Storage
- Create more than one copy in different locations.

Online Payment Systems

When entering data from bank cards you may be asked for: Card Number, Card Security Code (CSC), Expiry Date,
Cardholder Name

Examples of online third-party payment processors are PayPal and BenefitPay.

Contactless payment has also been introduced using NFC and RFID, however it is less secure.

Edexcel IGCSE ICT Revision Notes


Chapter 7 – Impact of the Internet
3.2 – Impact of the Internet on Individuals
Easier & Quicker Acess to News & Updates such
This diagram summarizes the key Impacts of the as Politics and Weather
Internet on Individuals.
\\ Entertainment such as Streaming or Memes
Some of them are further explained on the next
page.

Information &
Virtual Learning Environments
Services

Online Booking Systems

Online Banking & Shopping

New Skills Required such as use of Internet for


Impact of the Internet on

Teachers
Individuals

Employment New Job Opportunities, e.g. IT Specialists

More Jobless, for example, there are less bankers due


to Online Banking or fired due to lack of modern skills

Collabaritive Working

Working Practices
Flexible Working

Reduced Social Interaction

Social Impact Cyber Bullying

Less Physical Activity

Edexcel IGCSE ICT Revision Notes


Working Practices in further detail:
Working practices simply means the way people carry out their jobs.

Collaborative Working:

The internet allows colleagues to connect and work with each other in real time, making them more efficient.

BENEFITS DRAWBACKS

Each employee can focus on one individual


Skills and expertise are not shared
Individual tasks split task
across employees Employees become experts in the area Employees have reduced understanding of
they work on through narrow experience the full project

More than one person Expertise is shared It can be difficult for lots of people to agree
works on an individual
task Employees can check on each other’s work It’s to difficult to coordinate a large team

Flexible Working (Mobile working):

This type of work is completely based upon meeting the employee’s needs.

For example, employees can decide their working hours, or can work from home.

This has been made possible due to the internet, allowing users to access work from anytime and anywhere.

BENEFITS DRAWBACK

Employees can work at a time that’s right for them and There is not much face-to-face interaction, reducing their
take breaks when needed understanding of each other

Employees can fit their work around family life Work and time may not be managed effectively
Employees can access up to date information Employees may overwork themselves (Exhaustion)
Employees can work from anywhere The required resources may not be accessible.

Staying Safe Online


To remain safe online there are quite a few principles to follow.

1. Keep your personal information private and don’t share it online: This includes things such as Location, School,
Phone Number, Real Name, Photos, and Mailing Address or any Password of any kind. To stop strangers viewing
your profile, adjust your privacy settings.
2. Block any offensive messages of friend requests. This includes age-inappropriate content or suspicious
links/attachments.
3. Report anything inappropriate. Tell adults, or report on social media anything that upsets you or any sort of
grooming behavior.
Edexcel IGCSE ICT Revision Notes
Digital Footprint

Digital footprint is all the data that a user creates online, which is recorded and stored.

Any content you make, or post can easily be accessed by anyone on the internet and can easily be shared or recorded.
Therefore, you should always think carefully before posting any sort of content, and consider whether it’s appropriate to
be out in the public.

3.3 – Online Working from Home

Using the internet to work from home has been made possible due to advancement in computer software capabilities
and LANs. Online working from home has both advantages and disadvantages for both organizations and individuals.

BENEFITS DRAWBACKS

No need to travel to work. Distractions at home


- Saves money + stress and better for - This can either family or leisure
the environment activities

Can spend more time working/resting Suffer from a lack of social interaction
Impact on Individuals
No need to wear uniform Feel disconnected from the company

Work at time that suits them


Comfortable environment

Organize work around family life

Can attract a talented & motivated work force Difficult to manage and support employees

Difficulty in organizing payments around the


Employ people around the world
world
Impact on Organizations
No need for rent of office Concerns about data security

More efficient work from home Might not work as hard from home

When working from home organizations grant employees the following:

- Allowing them to transfer a copy of the organization’s data to home via email.
- Providing remote access to the data stored such as by using a VPN.
- Storing data on another company’s error and providing access to that data.

All the above makes the data more vulnerable and likely to be accessed by unauthorized users.

Edexcel IGCSE ICT Revision Notes


3.4 – Impact of the Internet on Organizations
Improved Communication

Access to Global Markets

Positive Impacts
Impact of the Interent on

Access to Global Workforce


Organizations

Easily Analyze And Acess


Large Amounts Of Data

Security Issues

Negative Impacts
Greater Competition

Security Risks:

When working from home organizations grant employees the following:

- Allowing them to transfer a copy of the organization’s data to home via email.
- Providing remote access to the data stored such as by using a VPN.
- Storing data on another company’s error and providing access to that data.

All the above makes the data more vulnerable and likely to be accessed by unauthorized users.

The unauthorized users can gain access through one of the following:

- Authorized users revealing their login details, either intentionally or unintentionally.


Prevention: Add policies to the company and train employees

- Unauthorized users intercept the data.


Prevention: Organizations use security methods such as encryption and those mention in Chapter 5

- Unauthorized users hack into the organization’s systems.


Prevention: Firewalls and intrusion detect systems as well as the stuff mentioned in Chapter 5

Edexcel IGCSE ICT Revision Notes


Examples of areas where competition has killed several organizations:

- Music retailers due to increased online downloads of music and streaming.


- DVD rental companies due to online streaming services.
- Estate agents due to people advertising their own properties individually.
- Newspaper publishers have had to adapt and become more advanced.
- Postal services due to people using communication software.

3.5 – Impact of the Internet on Society

Access to the internet and ICT is not equal.

Digital Divide – The gap between people who have access to digital devices and the internet and people who don’t.

Causes of the
Digital Divide

Economy & Social Factors e.g.


Infrastructure
Location Politics Religion Disability Income, Age or
Education

Impact on Individuals and Communities of No Access to Digital Technologies:

Basically, look back at the first page of this document, and think of the opposite of all of that.

- Reduced availability of goods and services


- Reduce Entertainment
- Reduced Education
- Reduced Communication and Cultural Awareness

However, it may be argued that the limited access to the internet allows for stronger communities.

Impact of Less-Restricted Access to Networks:

How has access to the Internet and various other networks impacted societies?

1. Media and Representation has improved as people are now able to freely voice their own opinions.
2. User-generated Reference Sites have risen (such as Wikipedia) making truth, knowledge and accuracy less
reliable and there is a limited number of experts and editors on such platforms.
3. Monitoring of Social Networks has also been adjusted, as people are easily able to organize riots and strikes.
4. Police and Moderation have improved through systems such as CCTV which helps in reducing crime rates.
5. People gather for Positive Movements such as the Digital Humanitarian Movement.

Edexcel IGCSE ICT Revision Notes


As the digital divide increases, the gap between the information rich and information poor increases.

Information rich – People with good access to information provided by communication technologies. Information poor
is the opposite of this.

This gap was always there as not everyone had access to newspapers, books or education, but has now increased.

People who do not have access to the internet may use alternatives such as SMS to communicate or even receive simple
updates.

Impact of the Internet to Change the Way in which People Socialize:

People’s ability to think and make decisions has been affected as they spend more time in the virtual world rather than
the real world.

Though the internet can be used for communication, moreover than not it leads to isolation from families and local
communities.

Some people argue that social media makes friendships meaningless, because on social media, even strangers can be
labelled as friends.

Edexcel IGCSE ICT Revision Notes


Chapter 8 – Online Communities
3.6 & 3.7 – Types & Uses of Online Communities

An online community is a group of people with a shared common interest who communicate online. There are 7.

Each online community has the following:

- A target audience.
- A function – What it does for people who use it.
- Features – Aspects that allow it to carry out its function.
-

Social Online
Online Gaming
Networking Workspace
Function: Allows members Function: Allow members
Fucntion: Members
to socalize and connect of the community to play
collaborate for the
through shared interests multiplayer games
purpose of work
and relationships together

Features:
Features:
- Profiles Features:
- Share, Comment, Friend &
Follow - User Profiles
- Status Updates and Posts - Game Information & - Cloud Storage
Manuals
- Tags - Chat Rooms
- Groups - Experience points:
Players can compete - Editing Permissions
- User Suggestions based on level of - Comments
- Reactions & Ratings experience - Virtual Meeting
- Notificatoions - DIscussion boards Platforms
- Third Party Integrations - Statuses - Contact Lists
- Analytics (Online/Inactive) - Shared Calendars
Details on some of these are - Notifications
on the page 3

Edexcel IGCSE ICT Revision Notes


User Generated User-Generated
Virtual Learning Reference Sites Contnet
Environments (Wikis & Forums)
(Phot Sharing + Blogs &
Vlogs)

Wiki Function: Website Fucntion: Allow people


Function: Allow prepared by several users to create online diaries
teachers and students all of which can add/edit
of events/articles or
to use learning and content
share content across
assesment matierals
communities

Wiki Features:
- Member Accounts
Features: - Edit Buttons
- Structured Language
- Log-in Systems - Search Tools
Features:
- Gradebooks
- Feed/Timeline
Forum Function: Members of - User Accounts
- Area to submit the community come together
assignments - Text Editors
for structured discussions
- Multiple choice - Upload Tools
quizzess/Atumoatic Forum Features: - Ratings, Tags &
grading Comments
- Communication Rooms - Groups - Third Party Integration
- Ability to share audio, - Moderators,
video or even web links. Adminstratros
- Posts & Threads
- Ratings
- Private Messages

Edexcel IGCSE ICT Revision Notes


Social Networking Features Explanations

Social networks can be used as powerful marking tools as they contain a large amount of information regarding people’s
interests.

Companies take advantages of this through something called targeted marketing:

1. Social networking companies store information regarding users in databases and analyze it.
2. This information is then sold to advertisers.
3. Advertisers can now use this information to specifically target relevant sponsored posts to match members.

Targeted marketing is advertising that is matched to internet users based on their attributes, such as their age group or
their gender, or their internet browsing history.

Users can also pay to promote their posts.

Analytics is information that results from the analysis of data.

This can be used by individuals and organizations to find the most effective methods of communication so that they can
grow and reach.

Third Party Integrations are basically using links to social networking sites so that people can easily share information.

For example, The British School of Bahrain’s website contains a link to their Instagram page. It also contains a link to
share their blogs as a Tweet on Twitter.

Forums Features Explanations:

Moderators – Members who have the right to allow or block posts or members.

Administrators – Members with the same privileges as moderators, except they can also promote members to be
moderators or demote moderators to be members.

Thread – A series of messages concerning the same subject.

Safety Features on Forums:

Word or URL Censoring – When posts are submitted, they are scanned for inappropriate messages and URLs. If
found, the post is rejected or sent to moderators.

Ignore/Block – Members can be muted or stop from accessing the forum.

Rules and Policies – Tell members what’s allowed and what isn’t. If rules are broken, moderators can send the
member messages through private messages.

Report/Flag – Allows members to tell moderators if other members have broken the rules of the forum.

Edexcel IGCSE ICT Revision Notes


How to stay safe online:
Social Bookmarking
Sites Anonymity of Others and Misrepresentations: Members
of online communities may choose to remain anonymous.
Social Bookimakring: Using tagrs to
This can protect users, however it also opens doors for
categorize web documents and URLs so
that other people can find content by people pretending to be other people.
using tags in searches

Disclosure of Personal Information of Location:


Function: Exist to Location data can sometimes be given away by geotagging
allow people to shar photographs. This feature should always s be deactivated.
eweb documents, and Users should always check their privacy settings to confirm
URLs with each other what information is being shared online.

Any signs of misrepresentation should be reported


immediately.

Cyberbullying:
Features:
This should be reported at anytime observed, whether the
user is the victim or witnesses it happening.
- Social Networking
Features
- Thrid Party Integration
- Tags
- User Accounts

Edexcel IGCSE ICT Revision Notes


Chapter 8 – Implications of Digital Technologies
3.8 – Implications of the use of digital technologies

Data Protection:

When storing data, there are certain conditions organizations must abide by. Similarly, individuals have rights regarding
what happens to the information.

INDIVIDUALS WHOSE DATA


COMPANIES MUST ENSURE
IS STORED HAVE THE RIGHT TO

Data is used fairly and lawfully Access a copy of compromised data


Object to data processing that could cause
Data is used for limited, specifically stated purposes
damage/distress
Data is used in an adequate, relevant manner Prevent processing of direct marketing

Data is not kept for longer than necessary Object to decisions taken by automated means

All is handled according to people’s data protection rights Have inaccurate data rectified and claim compensation

Some countries have agreements so that data can be transferred between them with adequate protection, like within
the EU.

Copyright Legislation:

Copyright is a legal power that provides the creator of an original work with the sole authority to use and distribute it.

Different countries have different copyright laws and legislation.

When you pay for something, you get the right to access it, however, that doesn’t give you the right to distribute it or
create copies of it. For example, if you buy and e-book, it’s illegal to create copies and distribute them as if your own or
free.

Some content doesn’t have copyright or is exempted.

Monitoring Individuals:

Individuals can be monitored in several ways, for example, their movement or communication.

Monitoring Movement:

1. CCTV (Closed Circuit Television) which could have facial recognition software
2. ANPR (Automatic Number Plate Recognition) is used to track cars in streets.
3. Monitoring the use of ID cards, travel cards, passports and card transactions.
4. MAC / IP Address Identification
5. GPS by apps

Edexcel IGCSE ICT Revision Notes


BENEFITS DRAWBACKS

Find people who are lost Compromising people’s privacy

Locate nearby friends Expense of sitting up

Identify people on networks High Energy Consumption

Locating potential criminals Making people feel untrusted

Keep travelers safe & secure transactions

Individual’s online communication and communication software can also be tracked for the same reasons listed above.

Sustainability Issues:

ICT can negatively affect the environment.

PROBLEM REASON HOW TO LIMIT IT

The power is produced using non- Renewable Resources


Power Requirements
renewable energy More energy-efficient devices

Use a lot of power from non-renewable Build the data centers in cold
Cooling Systems for Data Centers
energy environments

Education
When thrown away the poisonous
Poisonous Substance Recycling
substances leak away causing health
(Bromine, Mercury, Chlorine) Laws
risks
Harmless Alternatives

Edexcel IGCSE ICT Revision Notes


Health & Safety Issues:

ISSUE CAUSE HOW TO LIMIT

Looking at screens for a long time.


Regular Breaks
This is because human eyes are sensitive to short
Eye Strain Not too close to screen & large screen
wavelength (blue)
Blue Light Filters
It can affect our sleep.

Repetitive Strain Injury / Ergonomic devices and support


Using devices incorrectly and poor posture
Wrist Pain (efficiency and comfort devices)

Back and Neck Ache Poor Posture Maintain correct posture

Good Cable Management


Trip Hazards Trailing Wires
Tidy and Secure Cables

Residual Breakers & Fuses


Damaged Cables Cable Maintenance
Electric Shock
Liquid on Devices Fire Extinguishers
No Liquid Near Devices

Overheating Cooling Devices


Fire
Overloading Regular Maintenance

Edexcel IGCSE ICT Revision Notes


Edexcel IGCSE ICT Revision Notes
Chapter 10 – Online Information
3.9 – Availability of Information Online and the Use of Online Information

There are types of information sources:

Primary Source – You own the data. (Photos you have taken, Articles you have written)

Secondary Source – Someone else owns the data and you are using it (Radio Program, TV, Books)

Search engines are used to allocate relevant web pages.

They do this by comparing entered information to records in a database and give the most relevant results.

To make the results as accurate as possible:

- Use Keywords
- Use Search types (specify the type of information you are looking for)
- Use Search tools (Tools to help filter the results)
- Use Searcy Syntax
o AND is (+)
o NOT is (-)
o PHRASE MATCHING is (“”)

Some search engines also use autofill and suggestions. This could either be by closely matching results that are
frequently searched, or close to the searches on the database. It could also be depending on the user’s browsing history.

The information you use must always be fit for purpose.

This means it should be:

✓ Accurate so that it’s not incomplete or false.


✓ Not too old or too new (in terms of historical content)
✓ Relevant to the topic you are searching for.
✓ Reliable, meaning it matches other sources found online.
✓ Not Bias, meaning it looks at both sides of a topic and isn’t prejudice.
o You can do this by checking behind statistics used, asking questions regarding the opposing arguments,
and checking for reliability as well as missing information.

You should also make sure you are aware of the copyright legislation behind the data you use.

To avoid plagiarism, you can either:

- Credit the source and state that the information isn’t yours
- Rephrase it in you own words by understanding the information.
- Include URL, Author’s Name and Publication Date

Edexcel IGCSE ICT Revision Notes


Chapter 11 – Online Services
4.1 – Types of Services
SHOPPING SITES:
There are several types of online services, for example:
Shopping sites can have a product catalogue –
which contains a list of products that can be
Shopping Sites bought. This can store:

- Image of the Product


- Description
Booking Systems - Price
- Ratings
- Popularity
- Product Code
Bank - Number of Items in Stock

BOOKING SYSTEMS:
Educations and
Tickets can be bought for several things including
Training transport tickets, or even for leisure and
Online Services entertainment. E-tickets can be sent via email.

Gaming Sites BANKS:

Banks can offer customers with the following:


News & Other - Checking Balances
Information - Sending Balance Alerts
- Making Payments and Transfers
- Accessing Customer Service
Auction Sites - Changing Personal Information

EDUCATION & TRAINING


Entertainment - Libraries of online journals, online support,
Provides and learning/assessment materials.

NEWS & OTHER INFORMATION: AUCTION SITES:

These can include: Ratings of buyers are found on these to check for reliability and payment
speed.
- Weather
- Sports There are also ratings for sellers, again, for reliability and sending times.
- Stock Markets
- Currency Values Alerts and Notifications are also available.

Edexcel IGCSE ICT Revision Notes


4.2 – Impact of Online Services

Access to online services has improved people’s lives, in some cases changing their lifestyle at a whole. The advantages
of several online services are listed below:

SHOPPING BOOKING SYSTEMS

- Easily reorder products bought before. - Avoiding stations to buy tickets.


- Avoid travel. - Avoid queues.
- Check stock without having to visit. - Buy tickets in advance.
- Avoiding queues. - Be notified about delays.

LEARNING SERVICES INFORMATION PROVIDERS

- Avoid travel. - Receive weather/traffic alerts.


- Avoiding choosing living locations based on site of - Be rerouted automatically based on traffic
work information

ONLINE BANKING

- Avoid travelling to the bank.


- Avoid carrying cash, which is safer.

However, there are also some drawbacks to online services:

- People become less patient as they are used to the immediate availability of information.
- People become more isolated as detached from real-world communities and from face-to-face communication.
- Less need to memorize facts due to immediate availabilities.
- People become accustomed to skim-reading, and don’t truly understand all the information/facts.

Impact of Online Services on Organizations:


Online services have affected the way in which organizations function in which:

- Improved communication.
- Access to global markets.
- Access to global workforce.
- Use of big data to understand customer behavior.
- The way in which the organizations secure business information changes.
- Increased competition.

Edexcel IGCSE ICT Revision Notes


Transactional Data
Transactional data – Data that is sent between devices.

This data can be tracked. Usually, the transactional data is stored in cookies.

Cookies – Information that a website leaves on a user’s computer so that the website will recognize that user when they
use it again.

Cookies can be encrypted when transferred between devices.

Cookies could store:

- Time and data of transaction - Products bought/viewed.


- IP Address - Items in shopping baskets
- Referring Website (Website that linked to the - Buttons pressed by users.
current website the user is on) - Data entered in forms.

There are three different types of cookies.

Session
•Only stored until a webpage is closed.
Cookies

•Used to record information about user's use of the internet over time.
Presistent
•Used to keep a user logged in.
Cookies •Allo advertisers to track data.

•Used to personalize user experience through targeted marketing


Third
•Used on webpages that contain banner advertisments
Party
•If a user visits a web page that displays banner ads from an ad server, the ad serve can
Cookies store a cookie on that user's device.

Edexcel IGCSE ICT Revision Notes

You might also like