ICT Chapter - 1 7
ICT Chapter - 1 7
0|Page
Chapter 1:
Digital Devices
1|Page
Digital Devices:
Digital devices are pieces of hardware that use computers.
Desktop
Laptop
Mobile phone
Smart phone
1.1 Know the uses of mainframe computer and examples of devices that use embedded
microprocessors:
Mainframe computers are large computers with huge processing powers.
Microprocessors:
Hhousehold appliances).
The device controls what a computer does; it does something with it and provides an output.
Its can process programs, remember information or perform calculations.
1.2 know the difference between laptop and desktop computers an their uses:
Desktop computers usually need peripheral devices (equipment that needs to be connected to a
computer and used with it) such as; monitor, keyboard and printer whereas a laptop include a
screen, keyboard and trackpad which makes it a portable device (easy to carry and move ).
1.3 know about types of mobile/smart phones and hoe they can connect to the network (SIM)
2|Page
Smartphones: ios, Android
Mobile phones: viva
1.4 know the uses of tablet devices:
A tablet device is a very small portable computer with a touch-sensitive screen and keyboard.
You can:
Attach keyboards
Pens (stylus)
1.5 Describe the purpose and uses of various digital devices for specified needs:
Digital cameras and camcorders are used to capture still images and moving pictures
Most digital cameras can now fill moving images< but camcorders still can photograph images.
When a digital camera captures an image it breaks up when it sees through its lens into a grid of pixels.
2. Game consoles :
Games consoles enable users to play video games on a television screen games which are provided on
discs or as downloads from the internet, they use controllers which are often wireless to control vehicles
and all objects in the game.
Some controllers use motion sensors to allow the player to control the game with justice and body
movements.
Madern game consoles are multi-functional, they may have apps and connectivity that provides access
to local networks and the internet as well as the option to play movies and some music consoles.
Also have disc drives to play films and other contents on DVD Blu ray or 4K Ultra HD Blu ray media.
3. Home entertainment systems: ( TV, Sound Systems, Personal video recorder, BLU-player and
DVD players and game concoles)
3|Page
Televisions display still and moving pictures.
Screens Resolution : quality of the image is determined by the number of pixels used to display
the image.
HD TVs have a larger number of pixels meaning they have a higher resolution than standard TVs.
4- Media players:
1.6 Know about and understand the Navigational aids are used.
Navigational aids ( such as Sat-Nav ) can calculate the best route between two or more locations and
can provide updates to the best route if it not followed accurately.
Navigational aids use information from the GPS satellites to determine the exact location of the
device on earth. Navigation aids also use orientation sensors to know which way the device is
currently pointing, and the device display the users position and orientation on map.
GPS does not need internet connectively in order to work. However, navigation aids need internet
connectivity in order to update the map.
Smartphones are now replacing specialist in-car navigation aids. These are may navigation apps for
smartphones which have a range of features.
1.7 Know what a multi-functional devices are and give examples + coverage:
Multifunctional device : A device that doe serval different things or has serval different uses.
Coverage: When the designs of devices change so that they become similar to one another.
4|Page
A smartphone: Is a type of mobile phone, which means it has a primary function which is to make
phone calls. It can also be used to take photographs or to function navigational aids, fitness tracker,
music player or handheld game console. That’s why a smartphone is classified as a multi-functional
device.
Convergences is where many devices, or the function of multiple devices, merge ( coverage ) into one
device. This blurs the lines between devices to the point that device is not longer a singular device, one
device has many functions.
1.8 Understand and discuss the features of digital devices for specified needs:
Performance ( CPU,RAM)
Probability ( easy to carry, size, weight )
Storage ( hard disk drives, SSD, RAM)
User interface ( CLI, menu driven, GUI (WWIP), VOICE, GESTURE)
Connectivity ( wired, wireless, wi-fi, Bluetooth, infrared)
Media support ( SD cards, flash memory, CD, DVD/Blu-Ray)
Energy consumption (electricity, battery life)
Expansion capability ( Installing additional components)
Security features ( Username/passwords ,pins ,patterns, biometric ,locks, etc )
Peripheral devices are devices that can be connected to a computer such as, pc or tablet device.
Perhepticals can be connected inside or outside a computer and can be grouped into three groups:
1.9 Know about types of input devices/peripherals and when they could be used:
Keyboards: They are buttons known as keys, which users press to input text or to interact
with software. Keyboards send data to the computer.
Shortcut: A combination of key presses used to access common software commands quickly.
Pointing Devices: A pointer is used on a screen to select displayed objects.
Mouse : A mouse uses an optional sensor to recognize the movement of the device.
Tracker ball: A tracker ball is rolled to move the pointer. It dose not have buttons to press.
Track pad: A track pad surface senses finger movements, touches and presses.
Joystick: Commonly used on game controllers to move sprites around the games.
Graphic tablet: Is a flat pad used with stylus (pen shaped device) . Used for draing and
writing on tablet devices.
Scanner ( including OCR and OMR ):
5|Page
Scanners use light sensors to record physical documents as images, which are saved as files
to the computer.
Optical Mark recognition ( OMR ) software can be also used with scanners to detect simple
marks on a document. A common use for OMR is for recognizing and recording responses to
multiple choices tests. Software allows scanners to read characters on the document and
store the result in text file. This is known as optional character Recognition
1. Barcode scanner:
A barcode is a pattern of lines and gaps that can be read by a device.
Barcodes are often used in parcels, so that they can be tracked.
The barcodes represent letters and numbers which have been used to identify an
item.
Matrix barcodes:
Are also know as QR codes, they are newer and have more advantages over linear
codes.
They can hold much more information than linear barcodes.
They can be scanned in any angle.
Webcams:
Are specialized cameras. They are generally lower quality than camcorders, and may
have built-in microphones to capture sound. They can be used as security cameras.
Microphone:
Is used to capture sound.
Biometric scanner:
Biometric is a term given to the calculation and use of the measurable physical
characteristics of a human.
Fingerprint and retinal identification are being used in many places now and even
facial recognition systems are starting to be introduced.
Fingerprint recognition: scanners read the arches, loop and whorls in a fingerprint.
These are unique to everyone.
6|Page
Voice recognition: This requires a microphone to capture the voice, its then
compared a saved original.
Iris recognition: Also unique to each human but its is 120 times more detailed than a
fingerprint, meaning its 120 time.
The data on the magnetic strip can easily be stolen by criminals who put the car
Sensors:
Sensors are used to input data about physical environment. They can automatically input data without
the need for human action.
Their output is then processed by a computer. It is the main features in a smart device such as smart
phones or smart environments.
Types of sensors:
Light
Temperature
Pressure
7|Page
1.10 Know about types of output devices/peripherals and when they could be used:
Output peripherals are connected to a computer and output the results of the computers processing in
various forms, including:
Electronic display
Printed text
Video
Audio
Tactile (touch) forms
Monitor:
Allow user to see output from the computer on an electronic display.
Some monitor also have touch screen technology.
Printer:
1. Dot Matrix:
These printers are sometimes called ‘impact” printers. This is because the printer is made by
hitting or “ impacting “ the paper through a ribbon of ink, and this process is very noisy. The
paper is often has a number of carbon copy layers so it can make serval copies of the same
document as it prints it.
2. Inkjet printers:
These printers use cartridges containing different colored ink. Tiny dots of the inks are
sprayed onto the paper to form images or text.
3. Laser printer:
These printers contain a rotating cylinder or drum that holds an electrical charge. A laser is
used to discharge certain points on these drum and draw an image. Electrically charged
toner is attracted to those points on the drum and is heated onto paper that is passed over
the drum.
4. 3D printer:
Three dimensional (3D) printers real-life versions of digital models. These printers work by
adding layers of heated material from the bottom of the modal to the top. 3D- printed
8|Page
models take a long time to create. They are often used for complex items, sometimes with
working parts.
Data projector:
Data projectors are used for home entertainment. Such as: watching television or playing
games and for giving presentations in classroom. They have the following features:
Light bulbs : These bulbs can have various brightness levels (measured in lumens ) are
expensive to replace.
Zoom Functionally : The projected image can be made longer by enlarging the image using
either optical zoom or digital zoom.
Probability : Some smaller and lighter projectors are available, and these are easier to move
around.
What is a hardware?
Physical devices you can touch and see.
Notes:
Device: Storage device are used to store data or software that is used in a computer system.
9|Page
1.5.1 Know the difference between storage devices and storage media used to store data
A storage device allows users to save data and information to storage media. In other
words it is a physical device that allows communication between the storage device and
the storage media. Storage media are items that hold the data. Sometimes, storage
media is removable as is the case with CDs and DVDs.
1.5.2. Know the characteristics of hard disk drives (HDD), Solid state drives (SSD),
optical disk drives, flash memory drives.
o Hard disk drives (HDD) contain hard disk media. These drives provides a
connection from the disk to the motherboard, either directly using wireless
adapter like Wi-Fi or a wired port like USB.
o Solid state device (SSD, often referred to as flash devices) contain flash
memory media. They are otherwise identical to hard disk drives.
o Optical disk drives contain optical disk media. Newer drives are often
compatible with older media.
1. A hard disk drive (HDD), hard disk, it is a storage device that stores and retrieves
digital data using magnetic storage with one or more rigid rapidly rotating platters
coated with magnetic material.
2. Optical Media: Types of optical media includes ( CDs, DVDs and Blu-ray disks)
CDs can store up to 700 MB of data. The data is written to the disk using a laser, which writes data to a
plastic layer beneath layers of aluminium and acrylic.
◾ DVDs look very much like CDs. Data is written to DVDs using a shorter wavelength of red laser light,
which allows DVDs to store more data. They can store 4.7 GB on a single-sided, single-layer disk. Double-
sided, duallayer disks can store as much as 18 GB.
◾ Blu-ray disks are similar to CDs and DVDs, but use a scratch-protection coating. Violet laser light is
used to store data at greater density than the red laser light used in DVDs. They can store 25 GB on a
single-sided disk, and double-sided disks can store 50 GB.
3. Flah Media : Flash media are more energy-efficient than hard disks as they do not have moving parts.
For the same reason, they are also less likely to fail when they are moved around. This makes them
suitable for use in portable devices.
10 | P a g e
4. Magnetic Tape: Magnetic tape was originally designed to record sound, but it is now also used to
store data.
1.5.5 Know that storage media can be recordable/ write once (R) and rewriteable (R/W)
All optical media is recordable and is known as CD-R, DVD-R or BD-R. Some CDs and DVDs can be
rewritten (CD-RW, DVD-RW), and some Blu-ray media can be written then erased and rewritten (BD-RE).
Summary:
1.5.6 Understand the terms describing the capacity of storage such as bit,byte and multiplesof these
( Kb, mb, gb, tb ) (using 1kb= 1000 bytes/ 1KiB – 1024 bytes ).
Storage media store data in binary form. This means that each bit of data holds one of two values: 0 or
1. Different media types interpret 0 or 1 differently.
11 | P a g e
12 | P a g e
Chapter 2:
Software
13 | P a g e
1.2.1 Identify the purpose of systems software and applications software
Software Summary:
Systems software:
1. Operating systems: Windows, Android
2. Utility software: Defragmentation, System restore
3. Driver: Communicate to allow application software to be used on hardware, hardware to
work with software.
Application Software:
1. Communication software: Email, Instant messaging, video conferencing (Gmail,
WhatsApp, skype)
2. Presentation Software: Brands- PowerPoint, keynote
3. Spreadsheet Software: Brands- Excel, sheets, Numbers
4. Database Software: Brands- Access, SOL
5. Word processing software: Brands- Words, pages
6. Web Authoring Software: Brands- Dreamweaver, kompozer, word
1.3.2 Know about operating systems and system software tools such as utilities: ( Defragmentation,
backup, formatting ) :
System software: Programs that are designed to maintain or operate the computer system.
Utility Software: Is one form of system software, which carries out configuration and maintenance tasks.
1. Backup: Backup utilities create a copy of files and programs. Backups can be set to run automatically
(usually at a time when the system is not in use) or can be started by a user.
2. Defragmentation:
As a data is stored to a hard disk, some systems spread it across the disk wherever there is free space.
This means that sometimes data is fragmented and stored out of order or out of sequence.(not
organized)
14 | P a g e
To avoid this and to speed up the system, disk defragmentation utilities reorder the fragments of data so
data so that they are stored as close to each other as possible.
3. Compression: Compression utilities reduce the original size of a file or set of files.
4. Formatting:
Disk formatting prepares storage media such as a hard disk drive or USB flash drive for its first use. If a
disk has already been used, then formatting it will make all of the data on the disk unreadable by normal
appliances.
Disk formatting utilities make this process easy for users by providing them with the option to choose
the file system, file unit sizes and the name of the disk. Perhaps most importantly, they make sure that
the user really wants to format the disk.
1.3.3 Know about the role/function of the operating system, including basic knowledge of: ( single
user and network, memory management, resource management, security, print spooling):
The operating systems is a software program that manages the components of a computer system and
its resource.
The operating system performs many tasks such as resource allocation, scheduling, data management
and input/output control.
Examples of operating systems are windows 10, Mac OS, Linux and Unix.
1. Single- user operating systems: Only allow for a general user and do not provide the option to
customize the user interface for different users. They are often found in household appliances.
Sending requests to a server when users log in with their username and password.
Separating user accounts and ensuring that users cannot access each others files.
Providing access to network storage and shared resources such as networked printers.
3. Memory Management:
The operating system allocates the required amount of money (RAM) to one or more appliances. When
the application no longer requires the memory space, the operating system makes the space available
for other applications to use.
4. Resource Management:
Systems resources include internal components, such as the processor and graphic card, and external
devices, such as printers,. As well as allocated memory, the operating system ensures the system
ensures the system resources are made available to applications when they are required. The operating
system can tell the user when the resource becomes available.
15 | P a g e
5. Security:
Operating systems can give users secure access to a computer storage and other hardware through
usernames and passwords, biometric scanning or personal access cards. This is called authentication.
Operating systems can provide software firewalls to authorise or prevent network data from remotely
accessing a service or application.
6. Print spooling:
During large print jobs, the computer will have the pages ready for the printer faster than the printer
can produce them. This operating system keeps each pages in a queue ready for printing. This process is
called print spooling.
Application software: Allows users to produce a digital product. Apps usually download some servers on
the internet. Some devices, like smartphones and tablets, use operating systems that provide access to
app stores. Apps can also be installed using storage media like DVDs.
1- Office productivity tools: ( word processing, desktop publishing, spreadsheet, database, graphics
editors, photo editors, sound editors, presentation)
1- Word processing:
Word processing software lets users create documents that mostly include words. But also some
images. But also some images. They can also include tables, hyperlinks, equations, simple drawing and
shapes and charts.
Letters
Reports
Essays
Books
Some word processing applications allow people to work together on a document. Comments can be
added to the text so that the others can understand the writers intention and give feedback.
Word processing applications allow users to change the font and provide different layout views to allow
users to position text. They usually come with spelling and grammar checking tools that identify errors in
the text as the user types.
DTP software has many similar features to those in word processing software. The main difference is the
way in which the software allows users to work with complicated page layouts.
16 | P a g e
3- spreadsheet:
Spreadsheet applications are used to do calculations. Users can use and create formulae and functions
to perform automatic calculations on values that can be entered and changed later.
4- Database:
Database management systems ( DBMS ) are used to enter, edit and search data. Some systems can also
produce reports that dynamically display real-time changes to the data as it updates.
Image Editing: Applications that let users create and change bitmap images, such as digital photographs,
or vector graphics, such as drawings or logos.
5- Graphics Editors:
Graphics editing appliances allow users to create or edit vector graphics. Features of graphics editors
include:
- Vectorising images ( that is, converting or tracing bitmap graphics to vector graphics )
- Layers ( that is, having the ability to place some graphics on the top of others)
- Adding text
- Adding or drawing shapes and lines
- Resizing, aligning or moving shapes and lines
- Altering the colour of shapes, lines and fill areas.
6- Photo Editors:
These allow users to edit and enhance digital photographs and images. Features of photo editors
include :
17 | P a g e
7- Sound Editing:
It allows users to edit audio files or to join together different audio files in order to create multitrack
music or soundtracks for video. Features of this software include:
2- Web Authorizing :
It lets users create web pages that include text and images. Web browsers translate HTML into pages
that people can see and read. Web pages can be linked together to create a website for people create a
website for people to view on an intranet or on a web server on the internet.
3- Control software:
Control software takes input from one or more sensor(s), makes a decision based on the input valve and
then outputs something, such as a command, as a result. Control software is often used in engineering,
vehicles and building control systems.
4- Project management:
They are used to help plan and track the individual tasks in a project, so that projects managers can
make the most efficient use of the available resources. Some tasks cannot be started until a previous
task is completed or has been partly completed, so it is important for a project manager to see which
tasks are dependent on others. Project management applications can be used to allocate tasks to
individual people or groups of people, it can also provide option to be allocated for more than one task.
Some also Provide tracking as a tool for the costs and arranging resources to be delivered on time.
Communication software provides remote access to systems and allow users to contact people using the
internet. It can be used to send files and messages as text, images, audio and video.
1. web browsers:
Web browsers allow users to view pages and websites created in web authoring software and hosted on
served that are connected to the internet. These servers may be in other country.
2. Email:
18 | P a g e
Emails can be sent and received by software installed on a computer. This locally installed software acts
as a client to an email server. It often stores or uses a database of contacts, which is sometimes available
as another application.
3. Social Media :
Social media can be assessed through a web browser or by using locally installed apps.
4. SMS:
Short messaging services (SMS) applications are found on mobile phones. They allow users to send up to
160 characters per message using the mobile phone network. They do not require an internet
connection. They do not require internet connection.
5. MMS:
Multimedia messaging services (MMS) applications extend the capabilities of SMS. MMS can deliver
more than 160 characters per message and can include video, animations, images and audio. Like SMS,
they are sent using mobile phone network and do not require an internet connection.
6. Instant messaging:
Instant messaging applications are very similar to MMS applications, but they require a connection to
the internet. They can allow users to see when other users are typing, and users can prevent others
from seeing when the are typing.
1.3.5 Know about software licensing types; ( free software, open-source, proprietary software )
Sometimes, users require a software licence to be able to install and use software on a computer.
- Free or open-source
- Propriety software
1. Free software:
Free software licences give users the right to study, modify, copy or distribute a program. The user can
decide if, and how much, to charge for a copy of the software or any service provided by the software.
2. Open-source software:
Licences make the source code available to users so that they modify how the software works, or
distribute the modified or unmodified software.
3. Proprietary software:
It is a software that is marked and disturbed by its owner under a brand name. The software can decide
the fee for the software and whether or not the software should be disturbed. Proprietary software can
be made available for a fee or free of charge. When no fee is required, it is called freeware.
19 | P a g e
1.3.6 Understand the purpose of communication software:
It is to provide remote access to systems and to exchange files and messages in text, images, audio
and/or video formats between different computers of users.
1.3.7 Know why software is updated, how it is done and possible risks to data/systems:
Software updates are usually made available for download from a server on the internet. Some updates
can be scheduled to happen automatically when they are released.
It is important to back up a system and files before updating software in case the update introduces
problems such as, removing components that other software needs in order to function.
20 | P a g e
Chapter 3:
Memory
21 | P a g e
1.6.1 To know what RAM and ROM stand for :
1.6.2 Describe the characteristics of RAM and ROM, the differences between them and the impact
on the user of the size ROM/RAM.
ROM is used to load the main computer software ( operating system ) when the computer is booting
( starting ). Data can only be read.
Flash memory is a type of non-volatile. It retains information even without power. So it is ideal for
devices such as cameras, solid state drives and so on.
A processor is made of one or more central processing unit (CPUs). These carry out software
instructions. In processors that are made up of more than one CPU, each CPU is referred to as a core.
Processor speed is measured in clock cycles per second. This is the number of times per second the
processor can carry out one or more instructions. A user should also consider the amount of CPU can do
in each clock cycle.
22 | P a g e
23 | P a g e
Chapter 4:
Digital
communication
24 | P a g e
2.1.1 Know the range of ways that digital devices communicate:
1. Satellite:
Satellites transmit data to and from digital devices. The following use satellite communication:
• GPS
• Television
• Telephones
• Military
3. Wied (cables) :
• Devices can use cables to communicate with each other via a wired connection. There are many
types of wired connection, eg:
• HDMI
• USB
• Ethernet
4. Wireless :
Wireless communications is the transmission of voice and data without cable or wires.
E.g:
Smartphone
Air pods
Smart Watch
2.1.1 Know that digital devices can communicate device to device and by using networks :
Connects devices that are in a small geographic area (e.g. building/group of buildings)
25 | P a g e
Benefits of connecting to a LAN:
A computer network over a large geographical area. A computer network across cities and countries.
A small computer networks connects devices that are all near one user.
4. Tethering:
It allows another device to connect to a ‘ host device ‘ to share it’s broadband connection.
2.1.3- 2.1.4. Know the types of wireless communication and the differences between Wi-fi and
Bluetooth and when each is best used:
Bandwidth: The number of bits that can be carried by a connection in one second.
Buffer: An area of memory used to temporarily store data, especially when streaming video.
26 | P a g e
• Devices can also use wireless connectivity to communicate with each other. There also many
types of wireless connection. Wi-Fi and Bluetooth are the most common types of wireless
connections.
• Bluetooth is easier to use and consumes less power than Wi-Fi because it only requires an
adapter on each connecting device. Wi-Fi is more secure than Bluetooth. Bluetooth is less
secure than other wireless technologies such as WiFi. Wi-Fi allows more devices and users to
communicate at the same time.
2.2.1 Understand factors influencing the speed and volume of data transfer:
2.2.2 Understand the benefits and drawbacks of wired versus wireless communication in local
networks.
27 | P a g e
2.2.3. Understand the significance of bandwidth and latency, and their impact on the ‘user
experience’:
Latency:
Bandwidth:
Note:
28 | P a g e
• Bandwidth is the number of bits that can be carried by a connection in one second
• A buffer is the memory where data is stored temporarily when video streaming
• Latency is the delay in time it takes to transfer data between devices
• the longer we wait for data, the worse the user experience.
• If you have small bandwidth, you are more likely to experience congestion which means
a slower Internet connection
2.2.4. Understand the features of broadband, mobile broadband and cellular networks:
Broadband: Fast access to the internet through a connection to an Internet Service Provider (ISP).
• Each revision is marked with letter after the number, e.g 802.11a
Mobile Broadband:
• Provides high-speed wireless connectivity using 3G, 4G or 5G to connect to the mobile phone
network – which acts as the user’s ISP
Topic Questions:
. Wi-Fi
. Infra-Red
. Bluetooth
29 | P a g e
. Broadband
. Dial-up/Narrowband
. 3G
.4G
.Satellite
4. Give two types of wireless connectivity that a tablet computer can use.
. Wi-Fi
. Bluetooth
30 | P a g e
Chapter 5:
Networks
31 | P a g e
2.3.1. Know about network operating systems and how devices are identified on a network:
Network operating systems provides additional functionality to stand-alone operating systems. It also
provides access to network storage and shared resources.
. Passing usernames and passwords to a server for checking when a user logs in.
. Separating user accounts to ensure users cannot access other users files.
. protocols: Rules that allow the exchange and transmission of data between devices.
32 | P a g e
2.3.2 Understand the function of components of wired and wireless systems:
1. Cables:
3. Switch :
33 | P a g e
4. Gateway:
5. Router:
A router stores the addresses of all devices that are connected to it so that it can forward network traffic
to its destination using the quickest route.
*Most routers are used in homes include a switch and a wireless access point. They also act as
gateways; connecting the LAN to the internet; which is a type of WAN. Home routers are dynamically
allocated an IP address by the internet service provider (ISP).
6. Booster:
A booster is used to amplify the signal in a network so that its range can be extended. For homes and
offices.
7. Server:
- Authentication Server:
An authentication server checks usernames and passwords. Including Applications and Storage.
- Print Server:
A print server manages multiple printers at a time; dealing with print requests from client computers
and adding jobs to a queue so that so that individual printers are not overloaded with requests.
- File Server:
- Application Server:
34 | P a g e
Application servers provide clients with access to applications that can be run directly from the server.
2.3.3. Know the role of these for connecting to and using the internet;
1. Web Browser:
A web browser is a type of software application used to request and display information stored on web
servers. E.g. Web browsers, Google Chrome and Internet Explorer.
3. Search Engine:
A search engine provides users to find information in web pages stored on web server. Users enter
keywords that describe the information they want to find.
The search engine then compares the keywords with those in its database of web pages and returns the
results that are closest match to the keywords.
4. Filter Software:
Filter software prevents users from accessing inappropriate information. When a user tries to access a
web page, the URL address and content are compared against two lists of URL and keywords stored in
the filter software database.
If the results match anything in the blacklist then the user will not be able to access or view the web
page.
If the results match anything in the whitelist then the user is allowed to access and view the web page.
35 | P a g e
If it is in neither then the user can view the information. This is useful to schools and parents to protect
children from accessing disturbing or inappropriate content.
2.4.1-2.4.2. Know about peer-to-peer and client-server networks and know about about the role of
servers in a client-server network:
A LAN is a network contained to a small area such as a home or office network. Computers in a network
can be connected using one of the two different models:
Peer-to-Peer
Client- Server
Peer-To-Peer Networks:
Computers in a peer-to-peer network share their resources with other computers in the network, but
the do not access servers.
Client-Server Networks:
36 | P a g e
- Control of user access rights ( Users or groups of users, can be given access to some resources
and restricted from accessing others)
- Centralized administration ( Resources and user accounts can be managed by an individual, or
individual group of servers and administrators.)
- Centralized Backup ( User data is protected from loss because backups can be automated for all
users).
- Shared software ( Can provide access to shared software).
- Shared storage and file access ( Sharing storage means that users can make files available to
other. File permissions can be set for individual files, folders or drives, allowing users to access
data applications allowing them to work anywhere where there is a client).
- Roaming profiles ( This is the ability to log into any computer in an office and see your settings
and files).
2.5.1 Know about and understand the use of different forms of securing data:
Users log in to computers on a network to access centrally managed resources. Passwords are used to
authenticate a user to the network. An authentication server can be used to manage the authentication
of a user to a range of network resources and services.
2. Firewalls:
A firewall is used at the gateway to a network. It controls the network traffic to and from a network,
particularly the traffic from the internet. Firewalls prevent unauthorized users from accessing network
devices and resources. Firewalls are available as hardware and software.
3. Encryption:
Encryption is the process of encoding, scrambling or jumbling data so that unauthorized users are
prevented from being able to understand it.
- One method used to encrypt text is called a Caesar Cipher. This method shifts each letter to the left by
a set number of places. The number of places which the letters have been shifted is known as a key. A
Caesar Cipher is quite easy to crack, but most modern encryption is much more secure. There are two
types of encryption:
. Symmetric key encryption ( uses the same key at both ends of the process, meaning that the same key
is used to encrypt and decrypt the data).
. Public key encryption ( Uses two mathematically related keys called a key pair,. One key is used to
encrypt the data and a different key is used to decrypt it ).
4. WEP/WPA:
It is used to secure the wireless transfer of data. It is the least secure wireless data encryption
method because, every device on the wireless network uses the same key for every transfer.
37 | P a g e
It is a security protocol designed to provide better encryption than WEP, WPA generates a new
A VPN provides access to a private LAN from a remote location. The connection to the LAN is created
using the infrastructure of a public network like the internet. An individual might use a VPN to:
File access rights are also known as file permissions. They can be set for individual files, folders or drives,
and they ensure that users are either allowed to read only or allowed to read and write to the file, folder
or drive.
A transaction log can help to identify which computers and network devices have been accessed. This
can allow administrators to identify any unusual activity that might be a threat to data security. A
backup is a copy of one or more files.
38 | P a g e
Chapter 6:
Operating
Online
39 | P a g e
3.1.1 Be aware of risk to data and information:
1. Unauthorized Access:
Access to networks by users who are not permitted to access them is called unauthorized access.
Malware can show messages, play sounds, delete files or reprogram systems to perform tasks that will
harm the system and the connected hardware.
Some malware (Known as ransomware) threatens to delete a users files or places restrictions a users
accesses to software or resources until money is paid, usually to an anonymous account.
3. Accidental Deletion:
Users can sometimes delete files or even the entire contents of a drive by mistake. This can happen if:
Phishing is a technique used by criminals to get personal information and payment details from the
users. It involves sending large numbers of messages that appear to be from real organizations such as:
shops, banks or charities. Phishing messages are often sent by email ( provide information by replying to
message or pressing on a link to fill in the users personal information). It can also be sent via SMS or
instant message apps.
Pharming is a technique used by criminals to gain personal information and payment details from users.
Criminals create fake versions of trusted websites to trick users into entering their login details, which
are then used by criminals to enter the users account. Often the URL of pharming website is designed to
be very similar to the URL of the real website.
3.1.2 Know about methods available to secure data and personal information online:
1. Firewalls:
Firewalls control the data travelling into and out of a network. They examine the network addresses and
ports of the data. They then compare those details to a list of rules that can be changed by network
administrators. The list of rules determines what should be allowed to travel into and out of the
network.
2. Encryption:
Encryption uses a key to scramble data into an unreadable form. If encrypted data is interpreted on the
network. It is useless unless the interceptor has or can identify the key.
40 | P a g e
3. Passwords, PIN, biometrics, CAPTCHA tests, security questions:
Passwords, PINs and biometrics are used online to authenticate a user so that they can access an online
system, such as webmail or online bank account.
Anti-Malware:
Anti-malware prevents malware from accessing or operating on computers. It scans computer files in
rest time and allows users to scan files, folders, disks or whole systems.
Anti-virus:
A virus is malware that uses networks to spread to connected devices. Viruses spread vis communication
software such as email or web browsers. Viruses often look like normal files.
Anti-virus software constantly checks files that are downloaded and loaded by a computer for sign of
virus definitions.
Anti-virus software has to be updated regularly because virus code can be changed, either automatically
or by the developers of the virus.
Anti-Adware:
Adware: Displays unwanted adverts to users. Anti-adware software detects, quarantines and removes
adware.
Anti-Spyware:
Spyware secretly monitors and records computer data and user input.
Permissions: Authorization settings that provide the ability for a user or users to access files, folders or
drives.
41 | P a g e
6. Secure websites :
Hypertext Transfer Protocol (HTTPS) is used to exchange data between a web server and a client server.
HTTPS keeps communications private and provide security for users online accounts. Web browsers
often show that a website is secure by displaying a green padlock in address bar.
Users should always be careful when opening email attachments or hyperlinks in email and other
messages. This is because some are fake and designed to steal users personal information. Users should
ensure that their anti- malware software is up to date and be especially careful if;
8. Backup procedures:
Backups create one or more copies of data. A backup usually stored to an external storage device. This
makes the data more secure, because the backup files will be safe even if the original storage device
fails or is damaged, lost or stolen.
o Theft
o Malware
o Flooding or fire
o Power cuts
Third party payment systems: PayPal, Bank cards, contactless card using NFC.
Online third-party payment processors like PayPal allow users to create an account so that they can
send and receive money using email accounts for identification.
42 | P a g e
Bank Cards:
Bank cards allow customers to pay for goods and services online and in shops. When paying online, you
usually need to enter the:
- Card Number
- Expiry Date ( and sometimes the start date) of the card
- Name on the card
- Three- or four- digit card security code (CSC).
* The card number is not the same as the bank account number.
Near Filed Communication (NFC) is used in payment cards to allow the transfer of payment data. The
payment does not require a PIN or any form of user-authentication. If a card reader is in range and
requesting payment, then the contactless card will take payment up to a maximum amount.
* N FC cards are wrapped in foil to prevent the very weak signals from being intercepted by criminals.
43 | P a g e
Chapter 7:
Impact of
The
internet
44 | P a g e
The Internet:
The internet is not the same thing as the World Wide Web. The internet is the interconnected network
of computers that provides many online services to users. The World Wide Web is just one use of the
internet.
Protocols are used by applications to transfer data across the internet. These protocols include:
3.2.1 Know about the impact of the internet on employment such as; new job opportunities as the
nature of a job changes, new skill requirements and potential job loss.
The internet has had an impact on individuals employment, often requiring people to learn new skills so
they can change the way they work.
As the internet changes the work that people do, this provides new job opportunities.
New Skills:
Many employers now require employees to use the internet for work, meaning that employees need to
learn new skills.
If employees do not keep updating their skills in the use of the internet, they may not have the skills
required to carry out new work. If they are not willing or able to retrain, they could lose their jobs.
3.2.2 Know about the impact of the internet on working practices, including: collaborative working,
flexible or mobile working.
Collaborative Working:
Collaborative working allows work to be split into a number of individual tasks, each of which can be
done by a different employee. Collaborative working also allows more than one person to work on a
task at the same time.
Flexible Working:
45 | P a g e
3.2.4 Know about social impacts of the internet such as:
The internet has had a huge impact on the way in which people socialize, particularly thanks to the rise
of social media sites.
Social Interaction:
Humans are naturally social, which means that they require social interaction with others. Humans feel a
need to connect with each other and to participate actively in the world around us.
Cyberbullying:
Cyberbullying: Using the internet to send text, images or multimedia in order to upset or embarrass
someone.
Physical Activity:
Access to online goods and services means that people do not have to leave the comfort of their homes
to shop, go to the bank or even go to school. This will implement people in staying in their places
without moving which results in health problems and low fitness.
To stay safe when using the internet, users should follow three main rules:
Zip It
Block It
Flag It
Zip it:
Keep your personal information private and do not share it with strangers.
o Location
o School Name
o Phone Number
o Real Name
o Photos
o Mailing Address or Email Address
You can also use privacy settings to stop strangers from viewing your profile.
Block It:
Always block offensive messages or friend requests from strangers on social networking sites. Do not
open suspicious attachments or links.
46 | P a g e
Flag it:
You should always tell an adult if something online upsets you or if someone you don’t know requests to
meet you.
3.3.1-3.3.2 Understand how the availability of digital devices and the internet enables individuals to
work from home and know the benefits and drawbacks of working from home for individuals and
organizations.
Benefits to individuals:
Benefits to organizations:
Drawbacks to individuals:
Drawbacks to organizations:
1. Improved communication:
Organizations can communicate and interact with their customers and employees more easily and in
real-time using email, instant messaging and social media. They can provide up to date information for
customers easily.
The internet has made it easier for organizations to advertise and sell to customers in countries around
the world. In addition, the internet has also ensured that manufactures have easier access to businesses
that produce materials and parts and can communicate more easily with them. Also, by internet
organizations can employ people in other countries.
47 | P a g e
3. Information that is managed and used:
Organizations can make use of big data to understand the behavior of their customers, improve the
customer experience and make their processes more efficient.
1. Security Issues:
The data stored by organizations is often private and valuable. If data is stored in a central location.
Organizations use the internet to provide their employees with access to their systems while working
from home. They can also use the following methods:
Allowing employees to transfer a copy of the organizations data to home via email.
Providing remote access to the data stored in the organizations building. Such as; by using a VPN
Storing data on another company’s servers and providing access to that data.
2. Risk of Hacking:
There are three main ways in which unauthorized users can gain access to systems:
3. Greater Competition:
The use of the internet means that organizations must now complete in a global marketplace.
Some types of organizations and even whole industries have been put at risk due to the way in
which the internet has provided new channels for trade and distribution of goods and services.
There are many examples of this:
Music and film retailers have been threatened by the increased use of online downloads and
streaming.
DVD rental companies have had to deal with similar challenges, as more people now watch
films online.
Record labels have been threatened by the fact that independent artists can publish and
distribute their music online.
Estate agents have lost business as individuals advertise their properties online.
Postal services have been negatively affected by people’s ability to send messages and
digital media instantly.
3.5.1 Understand the impact on society of the ability of individuals to have less-restricted access to
networks at any time.
The Internet has enabled people to broadcast their own message and interact with global
audiences (through social media, YouTube etc)
48 | P a g e
Online content is still controlled to an extent by moderators.
Digital Humanitarian Movement – a group of people working together using ICT to promote
human welfare.
3.5.2 Know about the gap between the information rich and information poor.
Information Rich: People with good access to information provided by communication technologies.
Information Poor: People with limited access to information provided by communication technologies.
3.5.3 Understand the causes and implications of unequal access to ICT (locally, globally).
Below are some of the causes that lead to unequal access to ICT.
3.5.4 Know about the impact on individuals and communities of limited or no access to digital
technologies.
49 | P a g e
Can also cause individuals to become isolated from their families as they spend more time
looking at the screen of their digital devices.
Status updates allow people to know what others are doing without interacting with them
Some people argue that social media make friendship meaningless as strangers are labelled as
‘friends’
50 | P a g e