Edexcel IAL Information Technology YIT11 Unit 1 Full Notes P
Edexcel IAL Information Technology YIT11 Unit 1 Full Notes P
Table of Contents
1.1: HARDWARE ............................................................................................................................................... 4
1.1.1: Contemporary digital devices ................................................................................................... 4
1.1.2: Technologies used by digital devices ...................................................................................... 9
1.1.3: ‘Technical convergence’ in the context of digital devices ............................................. 11
1.1.5 Firmware ............................................................................................................................................ 12
1.1.6 Performance of digital devices .................................................................................................. 12
1.1.7 How to calculate data file size and time needed to transmit a file ............................. 13
1.1.8 Convert between binary and denary ....................................................................................... 17
1.1.9 Selecting digital devices for individuals & organizations................................................. 18
1.2 SOFTWARE ................................................................................................................................................ 20
1.2.1: The Role of System & Application Software ....................................................................... 20
1.2.2: The Role of the Operating System ......................................................................................... 20
1.2.3 Different sources of software and copyright types............................................................ 22
1.2.4 Software licensing options .......................................................................................................... 23
1.2.5 Software updates............................................................................................................................ 24
1.2.6 Selecting software .......................................................................................................................... 25
NETWORKS ....................................................................................................................................................... 27
2.1 Network models and protocols ...................................................................................................... 27
2.1.1 Computer network models ...................................................................................................... 27
2.1.2 Network communication protocols....................................................................................... 28
2.1.3 Network standards and protocols......................................................................................... 29
2.2 Network design and implementation .......................................................................................... 33
2.2.1 Network transmission media .................................................................................................. 33
2.2.2 Network metrics ................................................................................................................................... 34
2.2.3 Networking component (devices) ............................................................................................ 37
2.2.4 Drawing outline designs for networks .................................................................................... 38
2.2.5 IP addressing & MAC addressing .............................................................................................. 49
Ip Addressing ........................................................................................................................................... 49
Internet Protocol version 4 (IPv4) ................................................................................................... 49
Internet Protocol version 6 (IPv6) ................................................................................................... 49
Static IP addresses ................................................................................................................................ 49
Dynamic IP addresses .......................................................................................................................... 49
Dynamic Host Configuration Protocol (DHCP) ............................................................................. 50
1
Page 2 of 82
2
Page 3 of 82
3
Page 4 of 82
1.1: HARDWARE
Computer hardware refers to the physical components of a computer system, such
as the motherboard, processor, memory, storage, and input/output devices. These
components work together to perform the tasks that a computer is capable of, such
as processing data, storing information, and running applications.
Learning Objectives
✓ Understand the features and functions of contemporary digital devices
✓ Understand the technologies used by digital devices and how they impact on the
design and uses of devices
✓ Understand the term ‘technical convergence’ in the context of digital devices.
✓ Understand the concept of, need for, features and functions of embedded systems.
✓ Understand the concept of and need for firmware.
✓ Understand factors that can be used to assess the performance of digital devices
Connectivity
Most digital devices are equipped with a range of connectivity options, including WiFi,
cellular data, and Bluetooth, which allow users to connect to the internet and other
devices.
Processing power
Modern digital devices are equipped with powerful processors that allow them to run
multiple applications and perform complex tasks quickly and efficiently.
Storage
4
Page 14 of 82
Where:
o width and height are the dimensions of the image in pixels
o bits per pixel represents the number of bits used to represent each pixel in
the image.
For example, if an image is 1000 pixels wide and 800 pixels high and 24-bit color
is used, the file size would be:
File size = (1000 x 800 x 24) / 8 = 3,000,000 bytes = 3MB
It's important to keep in mind that the above formula calculates the file size of an
uncompressed image file, such as a BMP or TIFF file. If the image is saved in a
compressed format, such as JPEG or PNG, the file size will be smaller, but the
quality of the image may be affected.
Calculating the file size of a compressed image
To calculate the file size of a compressed image, you will first need to know the
compression rate or ratio of the image. The compression rate is a ratio of the
uncompressed file size to the compressed file size. For example, a compression
rate of 20:1 means that the compressed file is 1/20th the size of the uncompressed
file.
Once you know the compression rate, you can use the following formula to
calculate the compressed file size:
Compressed file size = (Uncompressed file size) / (compression rate + 1)
For example, if an uncompressed image has a file size of 3MB and a compression
rate of 20:1, the compressed file size would be:
o Compressed file size = (3MB) / (20 + 1) = 0.13MB
It's worth noting that the compression rate can be different depending on the
compression method and the quality of the image after compression. The level of
compression can affect the final file size, as well as the quality of the image. The
higher the compression, the lower the file size, but the image quality may be
affected.
Here is another example of calculating the compressed file size of an image with
a different compression rate:
Uncompressed file size: 5MB
Compression rate: 30:1
Wireless - Wi-Fi: Wi-Fi is a wireless local area network (WLAN) technology that
uses radio waves to provide wireless high-speed Internet and network connections.
Wi-Fi enables devices to communicate with each other and access the internet
without the need for physical cables. Some key features of Wi-Fi include high-speed
data transfer, mobility, and the ability to connect to a large number of devices at
once.
Draw the diagram to show a network design that will meet these requirements.
You only need to show devices and connections for the lower side road and the right-
hand part of the main road.
You should:
Example 4
A railway museum consists of two buildings and several outdoor exhibition spaces.
42
Page 56 of 82
• Dynamic web page generation: server-side scripts can dynamically generate web
pages based on user requests, such as displaying search results or personalized
content.
• Data-driven web applications: server-side scripts can access databases and other
server-side data to dynamically generate web content, such as online shopping sites
or social media platforms.
• User authentication and authorization: server-side scripts can handle user
authentication and authorization, ensuring that only authorized users have access
to sensitive information or protected resources.
The most common server-side scripting languages are PHP, Ruby on Rails, Python, and
ASP.NET.
Server-side scripting plays a crucial role in dynamically generating and serving web
content based on user requests and server-side data. This allows for the creation of
dynamic, data-driven web applications and improves the user experience by providing
personalized, dynamic web content.
Working in online environments can have significant impacts and potential benefits for
both individuals and organizations.
For individuals, online work can provide greater flexibility and independence, as they can
work from anywhere with an internet connection. It can also offer access to a wider range
of job opportunities and allow for a better work-life balance.
For organizations, online work can increase access to a global talent pool, reduce overhead
costs, and increase productivity through the use of technology and automation. It can also
support remote collaboration and communication, allowing for a more diverse and inclusive
workplace.
However, there are also potential challenges and limitations to working in online
environments, such as difficulty in maintaining work-life boundaries, lack of face-to-face
interaction, and cybersecurity concerns.
Overall, the impact and potential of working in online environments are significant and
complex, with both benefits and challenges to consider.
There are several security risks to personal data stored online including:
56
Page 69 of 82
4.3.1: Be able to interpret and create flow charts for a given scenario.
Certainly! Let's take an example scenario: a process for ordering food at a restaurant.
To interpret a flowchart for this scenario, you would look at the shapes and arrows in the flowchart and
understand what each step in the process represents. For example, a diamond shape might represent a
decision point, such as "Is the customer ready to order?" and the arrows would show the flow of the
process, such as "If yes, proceed to step 2. If no, go back to step 1."
To create a flowchart for this scenario, you would start by identifying the steps in the process of
ordering food at a restaurant. These steps might include:
Next, you would use shapes and arrows to represent these steps in a visual manner,
4.4 Systems
4.4.1: Understand the advantages and disadvantages of IT systems for
individuals and organisations
Information Technology (IT) systems can bring many benefits to both individuals and organizations,
but they can also present some drawbacks.
69
Page 82 of 82
it has also created new challenges, such as the need for new skills and the displacement of
traditional jobs.
6. Public Safety: Wireless access has improved public safety by providing access to emergency
services and enabling real-time communication and coordination during emergency situations.
While ubiquitous wireless access has many positive benefits, it also has some negative consequences
that must be considered. Some of the most significant include:
1. Cybersecurity Risks: The increased reliance on technology has created new cybersecurity risks,
including hacking, malware, and data theft. This can have serious consequences for individuals,
businesses, and governments.
2. Addiction and Overuse: The constant availability of technology can lead to addiction and
overuse, which can have negative impacts on physical and mental health, relationships, and
productivity.
3. Privacy Concerns: The collection and use of personal data by technology companies and
governments has raised concerns about privacy and the protection of personal information.
4. Displacement of Jobs: The increased use of technology has led to the automation of many
traditional jobs, leading to job loss and reduced economic opportunities for some workers.
5. Digital Divide: The digital divide refers to the gap between those who have access to
technology and those who do not. This divide can reinforce existing social, economic, and
geographic inequalities, and limit access to information, opportunities, and services for those
without access.
6. Social Isolation: The increased use of technology has changed the way people interact with
each other, leading to reduced face-to-face interaction and social isolation for some individuals.
7. Addiction and Overreliance on Technology: Overreliance on technology can lead to a lack of
critical thinking skills and an inability to perform tasks without technology. It can also lead to
decreased creativity, innovation, and problem-solving skills.
Overall, the impact of ubiquitous wireless access on society is complex and multifaceted, with both
positive and negative aspects. It is important to continue to monitor and understand the impact of this
technology on different aspects of society and to develop policies and strategies to maximize the
benefits and minimize the negative consequences.
82