0% found this document useful (0 votes)
297 views10 pages

Edexcel IAL Information Technology YIT11 Unit 1 Full Notes P

The document provides a comprehensive overview of digital devices, software, networks, online environments, IT systems, and data management. It covers topics such as hardware components, software roles, network protocols, online community dynamics, and the implications of working in online settings. Additionally, it addresses the importance of data structures, security measures, and the ethical considerations surrounding information technology.

Uploaded by

uvinidesilva0123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
297 views10 pages

Edexcel IAL Information Technology YIT11 Unit 1 Full Notes P

The document provides a comprehensive overview of digital devices, software, networks, online environments, IT systems, and data management. It covers topics such as hardware components, software roles, network protocols, online community dynamics, and the implications of working in online settings. Additionally, it addresses the importance of data structures, security measures, and the ethical considerations surrounding information technology.

Uploaded by

uvinidesilva0123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Page 1 of 82

Table of Contents
1.1: HARDWARE ............................................................................................................................................... 4
1.1.1: Contemporary digital devices ................................................................................................... 4
1.1.2: Technologies used by digital devices ...................................................................................... 9
1.1.3: ‘Technical convergence’ in the context of digital devices ............................................. 11
1.1.5 Firmware ............................................................................................................................................ 12
1.1.6 Performance of digital devices .................................................................................................. 12
1.1.7 How to calculate data file size and time needed to transmit a file ............................. 13
1.1.8 Convert between binary and denary ....................................................................................... 17
1.1.9 Selecting digital devices for individuals & organizations................................................. 18
1.2 SOFTWARE ................................................................................................................................................ 20
1.2.1: The Role of System & Application Software ....................................................................... 20
1.2.2: The Role of the Operating System ......................................................................................... 20
1.2.3 Different sources of software and copyright types............................................................ 22
1.2.4 Software licensing options .......................................................................................................... 23
1.2.5 Software updates............................................................................................................................ 24
1.2.6 Selecting software .......................................................................................................................... 25
NETWORKS ....................................................................................................................................................... 27
2.1 Network models and protocols ...................................................................................................... 27
2.1.1 Computer network models ...................................................................................................... 27
2.1.2 Network communication protocols....................................................................................... 28
2.1.3 Network standards and protocols......................................................................................... 29
2.2 Network design and implementation .......................................................................................... 33
2.2.1 Network transmission media .................................................................................................. 33
2.2.2 Network metrics ................................................................................................................................... 34
2.2.3 Networking component (devices) ............................................................................................ 37
2.2.4 Drawing outline designs for networks .................................................................................... 38
2.2.5 IP addressing & MAC addressing .............................................................................................. 49
Ip Addressing ........................................................................................................................................... 49
Internet Protocol version 4 (IPv4) ................................................................................................... 49
Internet Protocol version 6 (IPv6) ................................................................................................... 49
Static IP addresses ................................................................................................................................ 49
Dynamic IP addresses .......................................................................................................................... 49
Dynamic Host Configuration Protocol (DHCP) ............................................................................. 50

1
Page 2 of 82

MAC addressing ....................................................................................................................................... 50


2.3 Network security ..................................................................................................................................... 51
2.3.1 The impact of network security issues on individuals and organizations (threats
and solutions, open networks) .......................................................................................................... 51
2.3.2 Securing networks using both hardware and software ............................................... 51
3.0: THE ONLINE ENVIRONMENT............................................................................................................. 53
3.1: The internet and the world wide web ....................................................................................... 53
3.1.1: The internet and how it is structured (IP addressing and DNS) ............................ 53
3.1.2 Features, functions, impact, and potential of the world wide web ......................... 53
3.1.3 Static and dynamic web page content ............................................................................... 54
3.1.4: Client-side scripting ................................................................................................................. 55
3.1.5: Server-side scripting ............................................................................................................... 55
3.2 Operating online.................................................................................................................................. 56
3.2.1: Impact and potential of working in online environments for individuals and
organizations ............................................................................................................................................ 56
3.2.2: Security risks to personal data stored online and methods of protection .......... 56
3.2.3: The digital footprint ................................................................................................................. 57
3.3: Online communities ......................................................................................................................... 58
3.3.1: The concept of an online community ................................................................................ 58
3.3.2: The impact of online communities on individuals and organizations ................... 58
3.3.3: Monetisation opportunities provided by online communities ........................................................... 59
3.4: The cloud.............................................................................................................................................. 60
3.4.1: Cloud storage ...................................................................................................................................... 60
3.4.2: Cloud computing ................................................................................................................................. 60
IT SYSTEMS ...................................................................................................................................................... 62
4.1: Systems design ................................................................................................................................. 62
4.1.1: What are IT systems? ............................................................................................................. 62
4.1.2: System decomposition ............................................................................................................ 62
4.1.3 Designing IT systems ................................................................................................................ 63
4.1.4: The concept of ‘fitness for purpose’ when evaluating systems .............................. 64
4.2: Data flow .......................................................................................................................................... 65
4.3: Flow charts ...................................................................................................................................... 68
4.3.1: The concept of and need for flow charts ......................................................................... 68
4.3.1: Be able to interpret and create flow charts for a given scenario. ......................... 69

2
Page 3 of 82

4.4 Systems 4.4.1: Understand the advantages and disadvantages of IT systems


for individuals and organisations...................................................................................................... 69
4.4.2: Understand how a range of contemporary digital devices, peripheral devices,
storage devices and memory are used in IT systems to meet the needs of individuals
and organisations. .................................................................................................................................. 70
DATA AND DATABASES ................................................................................................................................ 72
5.1: Data and information ................................................................................................................................. 72
5.1.2: Understand sources of and the difference between structured and unstructured data. .................. 72
Sources of Structured Data: .......................................................................................................................... 73
Sources of Unstructured Data: ...................................................................................................................... 73
5.1.3: Understand the value to organisations of extracting meaningful information from data. ................ 73
5.2: Structured data .......................................................................................................................................... 73
5.2.2: Understand the structure of a relational database: ........................................................................... 74
5.2.3: Understand the concept of entities and the relationships between them: ....................................... 74
Relationship types ......................................................................................................................................... 75
5.2.4: Be able to interpret and create entity relationship diagrams for a given scenario. ........................... 75
5.3: Structured query language (SQL) ............................................................................................................... 77
5.3.2: Know how to select and use appropriate SQL commands, features, and functions to manipulate
data: .............................................................................................................................................................. 78
6.1: Environmental ............................................................................................................................................ 79
6.1.2: Understand the positive impact that information technology makes to environmental monitoring
(including smart houses and smart cities) and efficient use of resources. ................................................... 79
6.2 Legal, moral and ethical .............................................................................................................................. 80
6.2.2: moral and ethical issues associated with the use of IT systems: ........................................................ 80
6.3 Society ......................................................................................................................................................... 81

3
Page 4 of 82

1.1: HARDWARE
Computer hardware refers to the physical components of a computer system, such
as the motherboard, processor, memory, storage, and input/output devices. These
components work together to perform the tasks that a computer is capable of, such
as processing data, storing information, and running applications.

Learning Objectives
✓ Understand the features and functions of contemporary digital devices
✓ Understand the technologies used by digital devices and how they impact on the
design and uses of devices
✓ Understand the term ‘technical convergence’ in the context of digital devices.
✓ Understand the concept of, need for, features and functions of embedded systems.
✓ Understand the concept of and need for firmware.
✓ Understand factors that can be used to assess the performance of digital devices

1.1.1: Contemporary digital devices


Vocabulary
Contemporary digital devices, such as smartphones,
tablets, laptops and embedded systems typically Embedded systems computer systems that are
have a wide range of features and functions that designed to perform a specific function or set of
allow users to communicate, access information, functions within a larger system. They are
typically found in devices and appliances that
and perform various tasks. require some form of computing power, but are
not necessarily used as standalone computing
devices.

Some common features and functions of contemporary digital devices include:

Connectivity

Most digital devices are equipped with a range of connectivity options, including WiFi,
cellular data, and Bluetooth, which allow users to connect to the internet and other
devices.

Processing power

Modern digital devices are equipped with powerful processors that allow them to run
multiple applications and perform complex tasks quickly and efficiently.

Storage

4
Page 14 of 82

Where:
o width and height are the dimensions of the image in pixels
o bits per pixel represents the number of bits used to represent each pixel in
the image.
For example, if an image is 1000 pixels wide and 800 pixels high and 24-bit color
is used, the file size would be:
File size = (1000 x 800 x 24) / 8 = 3,000,000 bytes = 3MB

It's important to keep in mind that the above formula calculates the file size of an
uncompressed image file, such as a BMP or TIFF file. If the image is saved in a
compressed format, such as JPEG or PNG, the file size will be smaller, but the
quality of the image may be affected.
Calculating the file size of a compressed image
To calculate the file size of a compressed image, you will first need to know the
compression rate or ratio of the image. The compression rate is a ratio of the
uncompressed file size to the compressed file size. For example, a compression
rate of 20:1 means that the compressed file is 1/20th the size of the uncompressed
file.
Once you know the compression rate, you can use the following formula to
calculate the compressed file size:
Compressed file size = (Uncompressed file size) / (compression rate + 1)
For example, if an uncompressed image has a file size of 3MB and a compression
rate of 20:1, the compressed file size would be:
o Compressed file size = (3MB) / (20 + 1) = 0.13MB
It's worth noting that the compression rate can be different depending on the
compression method and the quality of the image after compression. The level of
compression can affect the final file size, as well as the quality of the image. The
higher the compression, the lower the file size, but the image quality may be
affected.
Here is another example of calculating the compressed file size of an image with
a different compression rate:
Uncompressed file size: 5MB
Compression rate: 30:1

The compressed file size can be calculated as:


14
Page 28 of 82

Ad Hoc Networks: An ad hoc network is a decentralized, self-configuring network


in which nodes communicate directly with each other without the need for a central
server or hub. This type of network is often used in emergency situations or where
a temporary network needs to be established quickly. Ad hoc networks are often
used in military, disaster recovery, or emergency response scenarios.

Tethering: Tethering is the process of sharing a device's internet connection with


other devices, such as laptops, smartphones, or tablets. This allows these devices
to access the internet using the data plan of the device that is tethering. Tethering
can be done through a USB cable, Wi-Fi hotspot, or Bluetooth, and it provides a
convenient way to share an internet connection when there is no other source of
Wi-Fi available.

2.1.2 Network communication protocols

Wireless - Wi-Fi: Wi-Fi is a wireless local area network (WLAN) technology that
uses radio waves to provide wireless high-speed Internet and network connections.
Wi-Fi enables devices to communicate with each other and access the internet
without the need for physical cables. Some key features of Wi-Fi include high-speed
data transfer, mobility, and the ability to connect to a large number of devices at
once.

ZigBee: ZigBee is a low-power, low-data rate wireless communication protocol


designed for use in small-scale, low-power devices such as sensors, smart home
devices, and industrial control systems. The main purpose of ZigBee is to provide
a simple, low-cost, low-power solution for wireless sensor networks and to support
the Internet of Things (IoT). ZigBee operates in the unlicensed 2.4 GHz spectrum
and can support up to 65,000 nodes in a single network.

Bluetooth: Bluetooth is a wireless communication technology that enables devices


to communicate with each other over short distances without the need for physical
cables. Bluetooth is widely used for connecting mobile devices such as
smartphones and tablets, as well as for wireless headphones, speakers, and other
devices. Bluetooth uses a low-power radio frequency to transmit data and can
support up to 8 devices in a piconet (a small personal area network).

Cellular - Global System for Mobile (GSM) Communications (3G/4G): GSM is a


cellular communication technology that provides wireless voice and data services
to mobile devices. 3G and 4G are third- and fourth-generation cellular technologies
that provide faster data transfer speeds, more reliable connections, and higher-
quality voice services. The main purpose of GSM and its advanced versions is to
provide wireless connectivity to mobile devices and to support the growing demand
for mobile data services.

Infrared: Infrared is a wireless communication technology that uses infrared light


to transmit data between devices. Infrared is used in a variety of applications,
including remote control devices, personal digital assistants (PDAs), and home
28
Page 42 of 82

The conditions are:

o when a vehicle stops at a red light on the side road


o when a vehicle enters the village on a main road over the speed limit.

• An emergency vehicle can send a radio signal to change the lights.


• The lights reset to the default setting after a set time.
• If a vehicle moves past a red light on any road, a digital camera takes a photo and
uploads it to the local police headquarters via the internet.

Draw the diagram to show a network design that will meet these requirements.

You only need to show devices and connections for the lower side road and the right-
hand part of the main road.

You should:

o represent a cable connection by a solid line


o represent a wireless connection by a line of dashes
o represent network components by a labelled box or symbol
o include appropriate network components in the control box.

Here is the completed network diagram

Example 4
A railway museum consists of two buildings and several outdoor exhibition spaces.

42
Page 56 of 82

• Dynamic web page generation: server-side scripts can dynamically generate web
pages based on user requests, such as displaying search results or personalized
content.
• Data-driven web applications: server-side scripts can access databases and other
server-side data to dynamically generate web content, such as online shopping sites
or social media platforms.
• User authentication and authorization: server-side scripts can handle user
authentication and authorization, ensuring that only authorized users have access
to sensitive information or protected resources.

The most common server-side scripting languages are PHP, Ruby on Rails, Python, and
ASP.NET.

Server-side scripting plays a crucial role in dynamically generating and serving web
content based on user requests and server-side data. This allows for the creation of
dynamic, data-driven web applications and improves the user experience by providing
personalized, dynamic web content.

3.2 Operating online

3.2.1: Impact and potential of working in online environments for


individuals and organizations

Working in online environments can have significant impacts and potential benefits for
both individuals and organizations.

For individuals, online work can provide greater flexibility and independence, as they can
work from anywhere with an internet connection. It can also offer access to a wider range
of job opportunities and allow for a better work-life balance.

For organizations, online work can increase access to a global talent pool, reduce overhead
costs, and increase productivity through the use of technology and automation. It can also
support remote collaboration and communication, allowing for a more diverse and inclusive
workplace.

However, there are also potential challenges and limitations to working in online
environments, such as difficulty in maintaining work-life boundaries, lack of face-to-face
interaction, and cybersecurity concerns.

Overall, the impact and potential of working in online environments are significant and
complex, with both benefits and challenges to consider.

3.2.2: Security risks to personal data stored online and methods of


protection

There are several security risks to personal data stored online including:

56
Page 69 of 82

4.3.1: Be able to interpret and create flow charts for a given scenario.

Certainly! Let's take an example scenario: a process for ordering food at a restaurant.

To interpret a flowchart for this scenario, you would look at the shapes and arrows in the flowchart and
understand what each step in the process represents. For example, a diamond shape might represent a
decision point, such as "Is the customer ready to order?" and the arrows would show the flow of the
process, such as "If yes, proceed to step 2. If no, go back to step 1."

To create a flowchart for this scenario, you would start by identifying the steps in the process of
ordering food at a restaurant. These steps might include:

1. Greet the customer and hand over the menu.


2. Ask the customer if they are ready to order.
3. If yes, take the customer's order.
4. If no, return to step 2.
5. Repeat step 3 until the customer is ready to order.
6. Enter the order into the system.
7. Confirm the order with the customer.
8. Prepare the food.
9. Serve the food to the customer.
10. Receive payment from the customer.
11. Thank the customer and bid them farewell.

Next, you would use shapes and arrows to represent these steps in a visual manner,

4.4 Systems
4.4.1: Understand the advantages and disadvantages of IT systems for
individuals and organisations

Information Technology (IT) systems can bring many benefits to both individuals and organizations,
but they can also present some drawbacks.

Advantages of IT systems for individuals:

1. Convenience: IT systems allow individuals to access information, communicate, and complete


tasks quickly and easily, from anywhere with an internet connection.
2. Increased productivity: With the help of IT systems, individuals can complete tasks more
efficiently, freeing up time for other activities.
3. Improved communication: IT systems provide various tools for individuals to communicate,
such as email, instant messaging, and video conferencing, making it easier for people to stay in
touch, regardless of their location.
4. Access to information: IT systems provide individuals with quick access to vast amounts of
information, from news and entertainment to educational resources.

Advantages of IT systems for organizations:

69
Page 82 of 82

it has also created new challenges, such as the need for new skills and the displacement of
traditional jobs.
6. Public Safety: Wireless access has improved public safety by providing access to emergency
services and enabling real-time communication and coordination during emergency situations.

While ubiquitous wireless access has many positive benefits, it also has some negative consequences
that must be considered. Some of the most significant include:

1. Cybersecurity Risks: The increased reliance on technology has created new cybersecurity risks,
including hacking, malware, and data theft. This can have serious consequences for individuals,
businesses, and governments.
2. Addiction and Overuse: The constant availability of technology can lead to addiction and
overuse, which can have negative impacts on physical and mental health, relationships, and
productivity.
3. Privacy Concerns: The collection and use of personal data by technology companies and
governments has raised concerns about privacy and the protection of personal information.
4. Displacement of Jobs: The increased use of technology has led to the automation of many
traditional jobs, leading to job loss and reduced economic opportunities for some workers.
5. Digital Divide: The digital divide refers to the gap between those who have access to
technology and those who do not. This divide can reinforce existing social, economic, and
geographic inequalities, and limit access to information, opportunities, and services for those
without access.
6. Social Isolation: The increased use of technology has changed the way people interact with
each other, leading to reduced face-to-face interaction and social isolation for some individuals.
7. Addiction and Overreliance on Technology: Overreliance on technology can lead to a lack of
critical thinking skills and an inability to perform tasks without technology. It can also lead to
decreased creativity, innovation, and problem-solving skills.

Overall, the impact of ubiquitous wireless access on society is complex and multifaceted, with both
positive and negative aspects. It is important to continue to monitor and understand the impact of this
technology on different aspects of society and to develop policies and strategies to maximize the
benefits and minimize the negative consequences.

82

You might also like