Upload
sana-hanif
View
165
Download
9
Tags:
Embed Size (px)
DESCRIPTION
This booklet has been updated
Citation preview
GCSE ICT Revision Booklet
Contents:
The exam is 1hr 30 mins Mixture of multiple choice, short and
long answers Answer all questions
Do not use brand names
Important things when looking at computers
RAM
USB CONNECTIONS
PROCESSOR
WI FI
HARD DRIVE SIZE
GRAPHICS CARDS
OPTICAL DRIVE
FUTURE PROOF
Video calling
msn
Wi-Fi
3g
Loud speaker
games
Touch screen
gps
Hands free
bluetooth
Internal memory
mp3
alarm
usb
roaming
radio
sms
calculator
camera
Personal organiser
Multifunctional
alarm
sms
alarm
calls
basic
smartspecialist
Simple menu interface
Loud speaker
basic
Large screen
Large buttons
Blue jacking is the process of sending unwantedmessages to other mobile phones usingBluetooth.
User Types
•Mobile phones can be expensive, so to avoid being a target, activate the lock feature which requires a pin.•If you take a video or photo of someone on your phone, you should ask for their permission, before uploading it to a public domain•Try to avoid using phones in a quiet place (library, trains)•Recycle your old phone•If internet enabled, avoid viewing content that is unsuitable for your age range•Don’t make prank calls or send malicious messages•Don’t drive and talk on your mobile•Activate keypad to prevent accidental emergency calls being made.
Mobile phone etiquette and safety
How to be safe and efficient when communicating online
• Texting too much can lead to RSU• Health risks associated with the use of mobile phones (Cancer)• Overuse of ‘text speech affects the ability to spell word correctly• Young people can be victims of bullying if they are targeted for their phones
Example exam question: Some people find it difficult to use a mobile phone. State two features that can make a phone easier to use? (2)
Pros & cons of mobile phones
Disposing of old mobile phonesRecycle your old phone.Trade it inSell itGive it to a charitySome countries re-use the components, other refurbish phones and sell them for a cheap price to developing countries
Why do shops offer to recycle your phone?
Legal requirementEnhances their reputationShows their environmentally friendlyGive it to a charitySell it on
Mobile broadband (3G 4G)• Relies on 3G network coverage• Need a sim & contact• Connection to the internet whilst on the move• More secure than Wi-Fi as all data is encrypted• No wires or cables• No need to look for hotspots• Access anywhere there is a 3G phone signal
Connectivity
Mobile phones operate on different frequencies in different countries. To be able to connect with a phone on a different frequency, the phone needs to be able to receive one or more frequencies. A phone can be:• dual band – picking up 2 frequencies• tri band – picking up 3 frequencies• quad band – picking up 4 frequencies.Having a quad-band phone allows you to use it in five different continents.
A mobile phones Network Band determines which countries the phone can be used in.
DISADVANTAGES• Interference, obstructions,
distance effect signal• Incur roaming charges whilst
abroad• 3G signal is not every where• You pay more if you go over
your limit• 24 hr. access (pressure,
stress due to working all the time)
• Limited download capacity
ADVANTAGES• Work anywhere,
anytime as long as there is a signal
• Work whilst travelling• No additional power
source• Can set up phone as
router and pair devices
Lets Communicate - Chapter 1 : Mobile Phone Features
Smart Phone A phone offering
advanced features. E.g. the
ability to send emails or surf the
internet
GPS in a Mobile PhoneGlobal Positioning System – a navigation system that:Gives the current locationDirections from current location to a specified locationDistance to a specified locationGive you directions/distances from current location to key services such as a hospitalGeotag-to attach the exact geographical co-ordinates of longitude and latitude to a digital image, giving the location of where it was taken
Designing a Mobile PhoneWhen designing a mobile phone for a particular age group you need to consider certain things:Weight of phoneFeatures of phoneVolume capacity of speakersNavigation or menu systemInterface - how they will use it e.g. touch screen or keypadScreen resolutionSize of screen and buttons
Pro’s and Con’s of mobile phones•Texting too much can lead to RSI•Health risks associated with the use of mobile phones (Cancer)•Overuse of ‘text speech affects the ability to spell word correctly•Young people can be victims of bullying if they are targeted for their phones
Memory cards are used as secondary storage. Memory card size is measured in gigabytes(GB). There are 2 types of memory card:• SD- good for storing photos• SDHC- good for storing video files
Multifunctional
Having the ability to do
many different things using the
same device
Threats to data on phone • Spyware /Viruses• (Tracking) Cookies • Physical damage to phone (storage) that corrupts data • Theft of the device • Blue-jacking • Loss of power • Application / system error
HDMI• Connects to a HDTV, PlayStation 3, Blu-Ray
player• Allows high definition electronic devices to
connect• Created high-bandwidth connections
between digital devices• Multiple HDMI inputs can be connected
using a switch
FirewireA FireWire connection lets you send data to and from high-bandwidth digital devices such as digital camcorders, and it's faster than USB
USBUSB cables let you attach peripherals to your device
Connections
HDTV• Digital• 1920x108
0• Wider
screen• More
colours
Connecting to the Internet:Ethernet Cable or wireless connection are the main 2 ways of connecting to the internet. A cable connection is faster than a wireless
one but may not always be available. A wireless connection is slower. There may also be security issues
connecting to an unsecured wireless network as there is a risk of hacking
network:Ethernet cable: A cabled connection which connects via an interface card, has three different speeds; basic, fast and Gigabit.Wireless: Allows computers to communicate via radio and microwaves. Powerline: Uses the existing mains power circuits in the house for data transmissionADSL (DSL): is a family of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network.
WIFI BLUETOOTH INFRARED
Within range of router or hotspot
Faster than others
Multiple devices can connect
Short distance, yet more than IR
Line of sight Only 2
devices connect at a time
slow
Entertain Me – Chapter 3
Choosing an ISP – You need to consider:
Cost Speed Download limits Email and Web
Space Storage Security Parental Control Reliability and
customer service
An ISP is: A company that offers its customers access to the Internet
Wireless Wired Flexible and convenient Can be used around the house , no
wires Bandwidth is effected by number or
devices using the wireless LAN Distance sensitive Interference (Can be affected by
household appliances) Less secure if not protected Effected by physical obstructions
(like walls)
Health & Safety, people can trip over the wire
Harder to set up and can be more costly in a large organisation
No Interference
2 main ways of connecting to a network –
Wireless/WiFI or Ethernet Cable
Broad BandA high speed connection
to the Internet that is always on
BandwidthThe amount of data that can fit through an Internet connection. A high bandwidth means more data
Download
Transfer of a file from a central computer to your
computer
Wireless Security Tips
Turn on WAP/WEP – this is a form of encryption which scrambles data sent over your network. You can only read it if you have the key. Disable SSID broadcast – shows your network is availableEnable your routers firewall if it has one – a firewall is a program that check incoming packets of data and determines if they are allowed in to the network. Enable MAC address filtering – router will only allow devices that have been registered with router. Disable when not in use
Threats to a Network VirusesHackersSpyware and MalwareInternal –staff and family members(may delete files)
LatencyThe speed of flow. A low
latency means there is only a small delay
It is important to for a good connection to have a high bandwidth and a low latency
Streaming when content is compressed and
sent over the Internet and is displayed in real time. When
streaming you do not have to wait for the media to download.
Wireless connection to the internet
GPRS General packet radio service 2G Integrated into mobile
phones Suitable for making calls and
sending texts
3G Third generation of mobile
phone technology 3G enables devices such as
mobile phones and mobile dongles to deliver broadband-speed internet.
Even the lowest-end, cheapest mobile phones are now 3G enabled
suitable for checking emails and browsing the web
4G Fourth generation of mobile
phone technology suitable for streaming,
mapping and Social networking sites
5 times faster than 3G Works on a different
frequency to 3G
CHAPTER 1The digital Divide
Lets Communicate – The Digital Divide
The digital divide is the gap between
those who have access to
technology and those who do not.
The following may have an impact on the digital divide.
On a low income Living in a rural area
Weak literacy skills
Have a disability From an ethnic minority
Elderly
Economic
Is to do wit money, wealth,
jobs, production, distribution and consumption of
goods and services
EducationalThis is about
learning and the knowledge
gained from learning
SocialThis is about
human society and the people who live in it
CulturalThis refers to
the behaviour, attitudes and lifestyles of a
particular social group
• People with knowledge of technology and the skills to use it can get better-paid jobs.
• The Internet gives people access to a wider range of products and services
• The Internet allows people to research products and get cheaper deals for goods and services
• The Internet has led to a rise in e-commerce and globalisation
Implications of the Digital Divide page 38-39 •People can feel left out if they do not
have technological goods and services.•Not having access to communications such as email, IM and mobile phones can affect people’s social interactions.
•Many cafés now offer facilities such as the Internet to attract customers•Many people carry around MP3/4 players, mobile phones and other digital devices.•More children stay indoors and play on games consoles instead of playing outside•Cultural and/or religious in influences might dissuade some groups of people from using ICT which could lead to lack of access, lack of education and an inability for countries to participate in globalisation
•Students who use computers at home or school can become independent learners and excel in education•Most schools are moving to personalised learning using VLEs. Without Internet access, young people cannot benefit from this.•A gap in ICT skills may exclude people from particular jobs.•People can take part in online courses to gain further skills and qualifications
Example exam question: Some people have limited access to digital technology. Discuss the impact this has on their lifestyle. (6 marks)
Staying in contact with people
VoIP – Voice over internet protocol [Used to make telephone calls via the internet. A headset or speakers and a microphone are needed. Now available on mobile phones with a 3G connection]
Social Networking – Allow users to connect with a large number of people.[provide ways of interacting including chats, messaging, email, blogging, video and image sharing
Instant Messaging – Talking in real time by typing and receiving messages
Ways of staying in contact with people
Blogs – An online journal that can be shared over the internet. Videos, images and text can be shared
The internet as a work tool
User Forums – allows users to get together for open discussions. general & specialist
VLE – Virtual learning environments are used in school and education. They allow teachers to upload resources and personalise learning for individual students. Students can access resources and have their own space where they can keep their work.
User Generate Websites (Wikis) – These websites are made by people working collaboratively adding their own content. [Advantages: the information is always current and not bound by copyright laws] [Disadvantages: Anyone can add to it so if not managed correctly information may be inaccurate, biased or untrue]
Podcasts – allows users to watch or listen to material at a time that suits them. People can create podcasts and upload them to websites, blogs and social networking sites for other to subscribe to and download
Accessing EmailsPOP3
Requires users to access email via an internet mail account/mail deleted from server when sent to client [Useful when you only check e-mail from one computer]
IMAP 4Emails pushed directly to phone and a copy of mail is kept on both server and client. You can check your email from multiple locations
Email[involves sending messages over a
communications network such as the internet]Advantages:
Cheaper than sending a letterWill arrive faster than a letterCan send emails 24/7 to any countryCan access emails from multiple
locationsCan send attachments
Disadvantages:Need to have an internet connectionCan receive virusesReceive large amounts of spam (junk
mail)
IM (instant messaging)Advantages: Quick and easy communication in real time People to work collaboratively and discuss their views The user to see who is online and decide if they want to engage in a
conversation Use through certain mobile phones, PDAs and other portable devices.Disadvantages: You need Internet access to use IM. If the connection is slow, this could impact on the real-time feature. Overuse of IM could result in less face-to-face contact with people. People may misunderstand information as it lacks emotion – to combat this,
emoticons have been invented. You may prefer to chat rather than type a message.
• Why register/join an online community?– post / review / comment – receive (email) updates – set content preferences – access more features – report (inappropriate) content / users
• What information do you need to provided?– User name, email, security question, contact details
• Why are reviews rated?– Encourage interaction with the site
– Increase reliability of reviews (through use of community)
Optical Disc
Solid
Magnetic Disc
Storage
Cloud
• Cloud Computing [a system where programs and data are stored centrally (in one place), on a server owned by a company such as Google. They are then accessed virtually (using the internet)]
Hard Disks, magnetic tapesRead with a moving head inside the disk drive.• Moving parts make it quite slow• Vulnerable to damage• Can be damaged by magnets• Large storage capacity• Found in PC’s as internal hard drive• Can connect external hard drives
Solid state storage devices store data using special type of memory flash memory. Flash memory non volatile and the data can be erased or changed. Used in mobile phones, tablets, notebooks PC’s E.g. USBs SSDs
An optical disc is a type of data storage which can be written to and read using low powered laser beam. • Cd, Dvd, Blu-Ray• cheap• Portable• Software distribution
Capacity gets larger
GPS A satellite based navigation system
Gives your current location Directions from current location to specified location Distance from current location to specified location
• Cyber cafe [is a cafe that has a number of personal computers connected to the Internet and available for use by customers]
• Hotspot [is a venue that offers a Wi-Fi Internet connection. E.g. Located in hotels]
• Cloud Computing [a system where programs and data are stored centrally (in one place), on a server owned by a company such as Google. They are then accessed virtually (using the internet)]
• Web Application [an application that is access using a web browser. Example being Google docs]
Geotagging Adding geographical coordinates of
where an image was taken. Metadata is the information stored about the
image
BiometricsA method of recognising someone based on physical characteristics. E.g. Fingerprints, face, iris, voice
ConvergenceWhen one device is developed to
carry out functions that were originally performed by several
different devices
Smart Working – Chapter 4Health Problems From Using ICT
Back pain can be caused by sitting incorrectly for a long time.
Eye strain can be caused by staring at the screen for too long.
Repetitive strain injury (RSI) is a result of doing the same thing again and again (e.g. typing or moving a mouse) – it causes stiffness, pain and numbness, usually in the joints of the arm, wrist or hand.
Stress is often a feeling of not being able to cope, for example because of too much work, poor relationships with colleagues and a lack of support from employers.
How to Avoid the Problems• Breaks – people working at a computer must have frequent breaks to help prevent health problems.
Computer users are advised to take 30-second micro-breaks every 10 minutes. You should try to do the following: look away from the screen, stretch, change your position frequently, move your feet, lift your arms and adjust your hips.
• Training – employers need to train their staff on how to use work stations correctly, to help prevent injury. It is a legal requirement for employers to display a health and safety poster produced by the HSE. The poster tells workers what they and their employers need to do in simple terms, using numbered lists of basic points.
• Eye care – employers have to pay for regular eye-sight tests for anyone who needs prescription glasses in order to use the computer. If the employee needs glasses to correct their eye sight, then the employer has to make a contribution to the glasses.
• Ergonomics – Designing equipment to match the body shape and be more comfortable to use. (e.g. curved chairs, arc mouse etc)
Teleworking
Working from home but staying in contact
using technology. Can use VoIP, Video conferencing, email
Advantages DisadvantagesSave money – don’t have to rent
office spaceor travel to office.
Less social contact – don’t see work colleagues.
Increased productivity – don’t waste time commuting
Distractions – more distractions at home than at work.
Flexibility – can work when you’re most productive.
Boundaries – blurs distinction between work and rest.
TrojansAre programs that record your activity on your computer and send the information back. They contain Spyware and Malware that get releases once they get past your firewallThey look legitimate but the are not. They hide on the computer doing their damage and allowing someone else to take control.
Online Shopping – Chapter 5Online Banking
Allows you to access your account from anywhere with an internet connection – 24/7 access to your accountMore convenient that having to go into a bank for some servicesCan go paperless and not have to receive statementsCan transfer money between accounts quicker/make paymentsThere are security issuesView/Track account details in real time
‘Bin raiders’, collect old receipts to find out your
card details.
Criminals can make a copy of your card – this is called
‘skimming’.
Principles of Data Protection Act
Law that organisations need to follow when storing personal data
1 People who keep the data must process it according to the law.
2 The data must be used only for the purpose it was provided.
3 Organisations should not ask for more data than is necessary.
4 Organisations should ensure that the data is accurate and kept up to date.
5 The data should not be kept longer than is necessary.
6 Organisations should respect the legal rights of the people whose data they are processing – the ‘data subjects’.
7 The data should be kept secure.8 The data should not be
transferred to other users in a country outside Europe, unless that country has similar laws to safeguard the data.
Autocomplete When your computer can
remember your usernames and passwords so you do not have to
keep re-entering them. Saves time and suitable if no one else uses
your PC and its secure. If someone accesses your
computer they will be able to log into your accounts
privacy policyA privacy policy is a legal document that discloses how the company will gather and use your data. It describes how you data is kept secureReputable firms will have their privacy policy in a prominent place and tell you what you are signing up for
Identity Theft When someone steals your details and your identity. They can find out your details from the different methods listed on these slides such
as Phishing, Skimming, spyware etc
Data Protection Act - 1984
(Revised 1988) Act designed to cover storage of personal data on computer systems.
Data subject – an individual who is the subject of stored data. Data subjects have rights under the Data Protection Act.
Details of Data Protection Act: 1. Data must not be acquired and processed unlawfully.2. Personal data must not be passed to other organisations without the
consent of the data subject.3. Data must only be used for a specific purpose.4. Personal data should be accurate and up to date.5. Suitable measures must be taken to ensure the safety of personal
data.6. Data should be the minimum required for the purpose and must not
be kept longer than is reasonable.
Smart Working– Software Options•You can now access software online or you can install it locally on your PC
Mobile broadband Mobile broadband allows
devices such as smart phones, laptops and netbooks to connect to a high speed
internet connection without the need for wires.
Mobile broadband relies on a 3G network the same
technology used by 3G mobile phones like the iPhone.
If you do not have the 3G technology built in you will
need a dongle
Strong PasswordA password that is difficult to guess. Use more than 7 charactersUse upper and lower case lettersUse combination of text, numbers and symbols
Smart Working – Chapter 4Collaborative Working
Means working together. Technology now allows us to work together from remote locations (Remote = not near each
other). Can use online workspaces such as Google documents. The files are stored virtually on the Internet and you can control who has access to them. You don’t need to
carry around a storage device but you do need access to the internet
Access RightsYou can control who has access to your documents and what they can do with them 4 levels of Access:
•Read Only•Read and Write•Read Write and Amend•Read, Write, Amend and Delete (full access)
Advantages Disadvantages
Can use on the move and access the internet from virtually anywhere
Signal is not always reliable (affected by tall buildings and the area your in)Not at fast as home broadbandLimit on the amount you can download
Advantages Disadvantages
You can access you software from anywhere with an internet connection and you do not need to install it on every computer
You need to have an internet connectionUsually has less features than locally installed software
Open Source Software page 24/26Is software code that is made available to the public domain so anyone can use itIt is usually free and you can then alter the code to customise it, as you have accessed to it You are not bound to a single software companyDifficult to receive support for the software as help is limited
Internet Dangers: Pop-ups [small screens that open automatically on your screen.
Can be genuine advertising or scams]Spyware [computer software that obtains information from a
user's computer without their knowledge or consent]Identity theft [takes place when someone collects information
about you and uses it for criminal purposes] Spam [unwanted email] Phishing [a link that is sent to a recipient and they may be tricked
to click on it and give their personal details] Hackers [people who try to gain unauthorised access to someone
computer] Viruses [programs that infect your computer and damage the
system settings and memory]
Lets Communicate – Internet Safety
Cookies: is a file which stores information related to your internet activity. Cookies save time as they remember your
login details, website preferences are saved so next time you visit them they will look the same.
Shopping sites also make suggestions for you based on your search history] [Can cause problems when computers are shared as they store login details that can be used by hackers]
Adverts are tailored to what you have been looking at
Remember where you have been
Payment Methods• Debit and credit
card• Gift cards and
vouchers•3rd party payment
processor such as PayPal pg.43
Online Shopping – Chapter 5 Advantages of online Shopping
You can shop online at any timeThere is a much greater selection of goods available online, and often for better pricesYou can use price comparison websites to find the item you want at the best priceIt is convenient to be able to shop without leaving your homeHas a positive impact on the environment as less people travel
Keywords
Definition
Required fields
Information that must be given when creating an online account
Combo box
A box you fill by selecting an item from a drop-down or by typing in information if the information you want to enter isn’t in the list
Validation
Checking that the data entered is sensible or within a certain range. E.g. someones age
Verification
Checking that the data entered is accurate. E.g.. Entering a password twice
Secret answer
Personal information that can be used to identify you
Captcha Prevents automated software from filling in a form
Auto-complet
e
Your computer’s operating system remembers your user names and passwords
Security• Ensure you have a firewall•Up to date antivirus software• Anti Spyware and Malware
software• Check your internet security settings. You can choose for example whether to accept
cookies
1. Why do you have to enter your password twice?
2. Why should you not check the remember password box when in a cybercafé?
3. Why are dots or stars used when entering your password?
4. What makes a secure password?5. Why are secret answers needed?6. When you register with a website, why do
you have to log onto your email before the account is activated?
QR Codes
QR(quick response)/bar codes
Use an app on your phoneIt reads, scans, processes the
dataUses a camera
Stores more data than a barcode
Third party payment
PayPal• Allows a person to pay money into an account
and then use this money to pay for goods online• Only need to put in credit card details once• If selling goods online, they can have the money
put into their account• Can purchase goods from vendors that don’t
have credit payment facility on their website
PhishingWhen fraudsters spam the Internet with an email claiming to be from a reputable financial institution (bank or building society) or e-commerce site. The email tries to make you click on a link and update your personal profile or carry out a transaction. The link takes you to a fake website designed to look like the real thing. Any personal or financial information that you enter will be sent directly to the scammer.
How to Spot Phishing:•Impersonal (does not state your nameCareless use of language – spelling & grammar mistakes Urgency – “you have 48hours to respond” Link to click on taking you to fake websiteWebsite Security
SSL Encryption (secure socket layer)
Https at the start of the website
Padlock in the browser Verified by Visa or
MasterCard Secure
Verified by Visa• protects your card against unauthorised
use and gives you peace of mind when shopping online.
• Once you’ve signed up to Verified by Visa, you’ll be protected whenever you make an online payment with your Visa card at any one of more than 300,000 web sites across Europe.
Verified by Visa involves two quick steps to authenticate your purchase.1. First you’ll see the personal message that
you provided when you signed up for Verified by Visa and that only you and your bank know about. This lets you know that the security screen you’re seeing is genuine
2. Then you’ll be asked to enter your Verified by Visa password.