Download as pdf or txt
Download as pdf or txt
You are on page 1of 117

ICT IGCSE Theory – Revision Presentation

Safety and Security

• 8.1 Physical Safety


• 8.2 e-Safety
• 8.3 Security of Data
Chapter 8: Safety and Security

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.1 Physical Safety

Electrocution from spilling drinks Fire from sockets being overloaded


• Ensure all drinks are kept away • Ensure plug sockets or
Chapter 8: Safety and Security

from the computers, ICT labs or extension cables are not


office desks. overloaded.

Physical Safety Risks

Equipment overheating Tripping over trailing cables


• Ensure ventilation in the room is • Ensure cable ducts are used to
good and equipment is not cover wires.
covered whilst in use. • Ensure cables are tucked away.

Strategies to minimise potential safety risks:


• Regular maintenance of equipment to check if it is passing safety standards.
• Regular check of the state of cables/plugs to ensure there is nothing exposed.
• Use of wireless connections to eliminate the use of cables.
• Ensure potential trip hazards are under desks (bags, plug sockets).

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.2 e-Safety

Why personal data should be


confidential and protected:
Chapter 8: Safety and Security

• Users can be stalked or even kidnapped – How to avoid


Personal Data: status updates can alert people of your
location at a particular time.
inappropriate disclosure
• Contact details (Phone • Details can be stolen, copied or pass on. of personal data:
number/email address) • Users could be blackmailed/ threatened
• Address Details into doing inappropriate things. • Ensure privacy setting in
• Personal Images • Customer details could be sold onto a third social media sites have
• Payment details including party. been activated.
card and bank details • Do not share data via
• Medical history social media or emails
• Political views with strangers.
• Family details • Do not post inappropriate
• Passwords images or content.

Discuss why e-safety is needed:


These days youngsters are not fully aware of the dangers the internet poses and
the potential risks they may put themselves under. For that reason eSafety
lessons are taking place in schools to educate young people about the potential
risks of using the internet appropriately so that they know how to stay safe
whilst being online.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.2 e-Safety

Minimise the Potential Dangers


Chapter 8: Safety and Security

Personal Use of Internet • Only use trusted websites or those


recommended by teachers.
• General browsing – keeping up to date • Only use a student friendly search
with current affairs. engine with safety filters.
• Researching for school projects. • Restrict access to certain content via
• Online shopping/banking ISP or filtering software.

Use of Email • Only email people already known to


you or from your contacts list.
• To keep in touch with friends, family • Think before opening an email from
and co workers. an unknown person.
• To share information including • Be careful about emailing your
attachments - Images, Presentations etc. school’s name or a picture of
• To get in touch with organisations. yourself in school uniform.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.2 e-Safety

Minimise the Potential Dangers


Chapter 8: Safety and Security

Use of Social Media • Know how to block and report


unwanted users in chat rooms.
• Personal Use: • Never give out any personal
• Share information about information online.
yourself to your friends and • Never arrange to meet strangers
followers. especially in a secluded place.
• Business Use: • Keep adults informed about your use
• Promotion/Awareness of social media.

Online Gaming • Never use real name when playing


games online.
• Online gaming is now very popular • Use appropriate language when
over many platforms. More games are using headsets and communicating
now providing multiplayer options with other gamers.
with some games. • Only play online with trusted
• Maps especially created for online friends.
gamers.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

What is Hacking?
Hacking

Chapter 8: Safety and Security

To gain unauthorised access to a computer system


without the user knowledge or permission.

Effects of Hacking?
• To delete, corrupt, copy and edit files. Sensitive Data could be
sold to competitors.
• Identity theft – to steal users identity.
• To expose a company (for example wiki leaks).
• To cause disruption and stop production.

Strategies to prevent hacking to protect data


• Use of firewalls – sometimes part of the operating system.
• Use of strong passwords which are frequently changed.
• Use of protection software to detect and block possible
hacking attempts.
• Hire a professional hacker to test the weaknesses of your
system.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

What is a computer virus ?


Computer Virus
A computer virus is a piece of programming code/software which
Chapter 8: Safety and Security

can install and replicate it self on to a computer system without


the user’s permission.

Effects of a computer virus ?


• Causes the computer to crash – become slower
• Sometimes files can be deleted – leads to computer malfunction.
• Data files can be copied by the hacker or the files could be
corrupted.
• Could stop production until the virus has been quarantined.

Strategies to prevent computer virus


• Install antivirus software and regularly update it.
Downloaded exe (executable)
• Do not use software or USB from unknown sources.
files could also be a virus when
• Be careful about clicking on links from untrusted
they are installed by double
websites.
clicking on them.
• Be careful about downloading attachments from
unknown email addresses.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

What is Spyware?
Spyware
Chapter 8: Safety and Security

Is a software which can monitor your use of the computer


(internet browsing) and monitor and log key pressed.

Effects of Spyware?
Spyware software will send the data back to person who planted
the spyware software on your computer. This could include
personal details like passwords and banking account information.

Spyware software could also install additional software to read


cookie data and change web browsing preferences.

Strategies to prevent Spyware


• The use of anti spyware software which is regularly
updated.
• The use of a pointing device to select characters when
entering sensitive data.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

What is Phishing?
Phishing
Chapter 8: Safety and Security

The recipient will receive an email which looks legitimate. The


email will normally request the user to update their details which
could be their password or payment details. To update the users
details they will have to click on a link which will take them to a
fake website.

Effects of Phishing?
The user will be tricked into entering their details into a fake
website. The sender of the initial email will have gained personal
details from the user. These details can be used fraudulently or for
identity theft.

Strategies to prevent Phishing


• Use a filter on your email account so that only emails
from an allowed users appear in your inbox.
• Always double check the URL and email address.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

What is Pharming?
Pharming
Chapter 8: Safety and Security

A malicious code installed onto a web server or computer will


redirect users to a fake website even though they have typed in a
legitimate URL address.

Effects of Pharming?
The fake website will look like the real website (websites tend to
look like a trusted websites to deceive the user). Users will be
tricked into entering their personal details. Like Phishing this can
lead to fraud or identity theft.

Strategies to prevent Pharming


• Anti spyware software could eliminate pharming code
from a computer.
• Always double check the URL to see if is the same one
you typed in.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

What is Smishing (SMS Phishing)?


Smishing
Chapter 8: Safety and Security

Users will receive fake SMS (text) messages claiming they have
won some sort of prize. Text message will appear to come from a
legitimate company. To claim the price users will have to call a
premium phone number or go to a website and give personal
details.

Effects of Smishing?
The effects are very similar to Phishing and Pharming where
personal details will be obtained from users. However users could
incur additional costs when they ring the premium number to
claim a prize.
Vishing: Uses a voice messages
Strategies to prevent Smishing which tricks users into calling a
• Double check the SMS message – check for spelling premium rate telephone. Voice
mistakes. mail may sound legitimate and
• Check the link of the website to see if it is legitimate? may request for user to update
• Contact your bank directly If you are requested to their details.
change some details.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

What is Spam Email?


Spam Email
Chapter 8: Safety and Security

Spam (junk) email is sent out to recipients from a mailing list. The
email could be part of a phishing scam or could be to promote
certain products. They are basically unwanted emails.

Effects of Spam Email?


If a spam email is part of a phishing scam then there is a chance
your details could be obtained. The network could also become
slower or unresponsive if there is a lot of unnecessary traffic
flooding the network.

Strategies to prevent Spam Email


• Use a junk email filter to stop spam email coming into
the inbox.
• Do not sign up for any commercial mailing lists.
• Do not reply to spam email.
• Untick the check box if you are asked to give your
email to a third party.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

What is credit card fraud? Credit Card Fraud


Chapter 8: Safety and Security

Online credit card fraud is when a user is tricked into giving their
personal and financial information. This could be via phishing,
pharming or the use of spyware software.

Effects of credit card fraud?


When a users account has been breached (credit/debit card
details have been obtained)then unauthorised purchases can be
made. Also money can be transferred out of the account.

Strategies to prevent credit card fraud.


• Have a strong password on your account.
• Ensure website has a secure connection.
• Install and update spyware software.
• Regularly check bank statement for any suspicious
activity.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security
Biometrics is aof
8.3 Security method
Data of authentication. It relies on unique characteristics of human beings.
Biometrics data is difficult to copy and requires the user to be present so that this method of
authentication can be used.
Chapter 8: Safety and Security

Advantage Disadvantage
Fingerprint Scans: • Very easy to use. • If the skin is damaged
Users will have press their finger • Very high accuracy. then it may be difficult
against the scanner. Finger prints • Small storage for the reader to read
are compared against those stored requirements for and recognise the
in the database. biometric data. fingerprint.
Retina/Iris Recognition: • Very high accuracy. • Very intrusive
Scans use infrared light to scan • No way to replicate a • Expensive to setup
unique patterns of blood vessels users retina. • Takes a while to scan.
in the retina.
Face Recognition: • Non-intrusive method • Physical features can
Physical facial features are • Cheap technology change over time with
scanned and compared to the age.
information held in the database.
Voice Recognition: • Non-intrusive method • Very low accuracy.
User will use speak which will • Cheap technology • Users voice could be
compare the voice to one held on • Verification is very affected by an illness.
the database. quick.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

To protect your personal data from being obtained you need to be fully
aware of phishing, pharming and vishing scams. There are always signs
Chapter 8: Safety and Security

which should cast doubt to whether you should disclose your personal
information. Also the use of an updated spyware software would help
improve security on your computer.

Any attempt to obtain illegal information should be reported to the


authorities.

Why is it Used
Firewall • Firewall provides security to a computer or
network.
Users Firewall • Is located between the computer and internet
Computer (Hardware Internet connection.
or software) • Firewalls will examine network traffic and block
and alert users to potential risks.
Passwords and User Name
Passwords are a method of authentication. They are used frequently online when logging
onto user accounts. If passwords are breached then your account may be hacked. Details
could be shared with other users of the internet.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

Encryption is the process of converting information into a form that is meaningless


to anyone except holders of a ‘key’.
Chapter 8: Safety and Security

Encryption Key 1 2 3 4 5 6 7 8 9 10 11 12 13
A B C D E F G H I J K L M
14 15 16 17 18 19 20 21 22 23 24 25 26
N O P Q R S T U V W X Y Z

Hello Data is Data is Hello


Encrypted 85121215 Decrypted

Data in scrambled into a meaningless Data is now in a


format. Even if it is intercepted it would format which can be
mean nothing to hackers. understood.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

Issues Related to Security of Data


Cloud: Online storage medium used • Data has been lost in the past during a
Chapter 8: Safety and Security

to backup files. Files can be accessed routine backup.


from any device with an internet • Celebrity data has been hacked and shared
connection. including images.
• The security of the building where the
servers are held and access rights to
employees could effect the security of the
data.
Moderated Forums: Online Security of Forums:
discussion forum where all posts are
moderated by an administrator. Moderated forums are more secure than un-
moderated forums as posts are regularly
Un-Moderated Forums: No checked by the admin. Inappropriate posts
measures are place to moderate which could be offensive can be deleted.
posts by users.

Digital Certificates
They are used to verify the identity of the sender in an online business transaction. It
also provides the opportunity for the receiver to give an encrypted response.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Safety and Security

8.3 Security of Data

Secure Socket Layer (SSL)


• Using a secure connection ensures data is kept safe when sending sensitive information.
Chapter 8: Safety and Security

• Secure websites encrypt information before sending it to others.


• Only the computer on the other end can read and understand the data.
• Websites which depend on security can have their websites reviewed and validated by
companies called certificate authorities. These reviews will ensure the website is secure.
Features of a web page that identify it as using a secure server

S will show after http in the URL address – for


example https://www.ebay.co.uk

Padlock will be shown on browser to show


users the webpage is secure.

Colour and company name will be shown in the


address bar in the colour green once it has
been validated by the certificate authorities as
being secure.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Audience

• 9.1 Audience Appreciation


• 9.2 Legal, Moral, Ethical and Cultural Appreciation
Chapter 9: Audience

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Audience

Audience Appreciation

It is very important to tailor an ICT solution to the proposed audience. A number of factors
need to be taken into consideration to ensure the ICT solution is suitable for its target
audience.
Chapter 9: Audience

The following methods can be used to find out more Once the ICT team are aware of
about the potential target audience. the customer needs then they
can take the following into
• Interviews
consideration:
• Questionnaires
• Market Research
Use of Language
Based on the research the ICT team will have a
clearer idea about the following factors: Use of colours

Usability

Target Audience Age Audience Experience Level of complexity


Audience
Audience Expectations
Expectation Audience Knowledge Use of multimedia and
interactive content
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Audience

Legal, Moral, Ethical and Cultural Appreciation

Copyright laws protect software in very much the same way as music CDs, Video etc. Software
Piracy is a continuous issue for software developers and measures have been put in place to
make it more difficult to use illegal copies of software.
Chapter 9: Audience

It is illegal to: Measures from software developers to


prevent the use of illegal software:
• Make a software copy to sell or give away.
• Rent out software. Use of a Product Key when installing
• Use a software on a network on multiple software.
computers.
• Use name or branding of copyrighted
software on another software without
permission. Online Activation to ensure legitimate
• Using code from copyright software product key has been used.
without permission and then passing the
software on as your own to sell. Software CD/DVD must be in the drive
whilst software is being used.

Making users agree to terms of conditions


before installation of software.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Audience

Legal, Moral, Ethical and Cultural Appreciation

When creating an ICT solution consideration also has to be taken regarding legal, morality,
ethics and cultural issues.

Legal: Ensure copyright laws are abided by including not using any coding or branding from
Chapter 9: Audience

existing copyrighted software.

Morality: To distinguish from right or wrong. Sometimes it may not be illegal to carry out an
act however it could be against your morals. For example setting up a fake website to deceive
is not illegal but questions your level of morality.

Ethics: Is to break a code of conduct. One example could be to leak information to a rival
software publisher or to the press about new software ideas.

Culture: When software is released in different cultures then care must be taken so that people
are not offended. For example certain use of words could be offence to one culture and not to
another. If certain computer games mock religion or cultural beliefs then again this could cause
offence.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
Audience

Should the internet be policed?

The debate continues on to whether the internet should be policed. The following are some
reasons why some users of the internet believes the internet needs policing:

• Recent hacks on major co-operations (Sony/QNB)


Chapter 9: Audience

• Sharing of terrorist material.


• Abuse in chat rooms, social media including Twitter.
• Grooming social media platforms.

Should the Advantages Disadvantages


internet be • To protect vulnerable users • It would be extremely difficult and
policed? gaining access to undesirable expensive to police the internet.
websites. • Infrastructure including staff and
• To prevent illegal material offices would have to be required.
(software, videos) be openly • Would be difficult to enforce
posted and shared by web users. different rules in different countries.
• To bring to justice those users • Could go against freedom of speech.
who continually misuse the
internet for their personal gain.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

• 10.1 Communicate with other ICT users using email


• 10.2 Effective use of the internet
Chapter 10: 10. Communication

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Communicate with other ICT users using email

Email is very popular form of communication between people. However many countries have
laws to protect people from the misuse of emails.
Chapter 10: 10. Communication

Below are some laws which companies and individuals have to follow when using email:

Ensuring emails do not have Organisations are required to


false or misleading subject ask for permission (opt in)
lines. before they can send emails to
individuals.
Organisations must include
valid postal address. There should be a clear way for
recipients to “opt out”
Organisations are not allowed
(unsubscribe) from receiving
capture and store lists of email
email.
addresses.

Organisations must ensure privacy policy are


clear and that subscribers are made aware of
such policies.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Communicate with other ICT users using email

Acceptable Language: Examples of using


• When sending an email the language and content inappropriate language:
Chapter 10: 10. Communication

within the email needs to be appropriate. • Abusive, racist,


• If the emails is being sent to an employee within threatening language.
a business then the language should be formal. • Obscene Images /
illegal content

Senders should consider what they


write as content in an email could be
misunderstood or taken out of context.

Senders should check for Netiquette: The rules of Avoid humor as some people
spelling and grammatical errors. may not understand the joke.
etiquette that apply when
communicating over
Respond quickly to an email Do not plagiarize and obey the
computer networks,
message. copyright law.
especially the Internet

Do not capitalize every thing.


WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Communicate with other ICT users using email

The content of an email can be protected by the copyright law. If the


sender of an email states the message is confidential then it is important
Chapter 10: 10. Communication

the email is not forwarded onto a third party. It could also be a case of
attachments being downloaded and also passed on.

Sometimes organisations will send an email with a copyright statement at


the bottom of the email.

If your email account is not secure then emails could be sent from You could also be at
your account without your permission or knowledge. risk due to email
scams
Your email account could be hacked due to the following reasons: (phishing/pharming).

Having a weak password Your email inbox could


also be jammed up by
Leaving your computer on and walking out of the
spam email.
room whilst being logged into your email.

Using your email on a shared computer with


multiple users.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Communicate with other ICT users using email

What is Spam Email? Strategies to prevent Spam


Email
Chapter 10: 10. Communication

Spam (junk) email is sent out to recipients from a mailing list. The
• Use a junk email filter to stop
email could be part of a phishing scam or could be to promote
certain products. They are basically unwanted emails. spam email coming into the
inbox.
• Do not sign up for any
Effects of Spam Email? commercial mailing lists.
If a spam email is part of a phishing scam then there is a chance • Do not reply to spam email.
your details could be obtained. The network could also become • Untick the check box if you
slower or unresponsive if there is a lot of unnecessary traffic are asked to give your email
flooding the network. to a third party.

Email Groups are contacts which are grouped together


So that emails can be sent to multiple recipients.

When sending an email to a group you would just have to


write the name of the group rather than writing
everyone's email address.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Effective use of the internet

Internet – Worldwide Collection of Networks:


• Browse the internet
Chapter 10: 10. Communication

• Social Networking & Communication


• Online shopping & banking
• Transfer files from computer to computer

World Wide Web (WWW):


• World Wide Web is part of the internet.
• Can be accessed using a web browser.
• Consists of a massive collection of webpages.

Intranet – Defined as a computer network based on


internet technology:
• Normally accessible by internal members of the company via a
username and password.
• Information is specific to the needs of the company.
• Less chance of external threats such hacking and viruses.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Effective use of the internet

HyperText Transfer Is the rules which are followed when transferring information across
Chapter 10: 10. Communication

Protocol (HTTP) & the internet. Rules are agreed between the sender and recipient
(HTTPS) when data is being transferred.

Uniform Resource • A web browser allows the user to display a webpage. A web
Locator (URL) & Web browser will use URLs to access specified websites.
Browser • URLs are represented by numbers (http://100.100.100.1)
however it is not very user friendly.
• So therefore an alphanumeric format (http://www.yahmad.o.uk)
HTTP or
HTTPS

Protocol:// Website Address /Path/Filename

http://www.yahmad.co.uk/Pages/Chapter18.html
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Effective use of the internet

File transfer Protocol


Chapter 10: 10. Communication

(FTP) FTP is a network protocol when


transferring files from one computer to
another over the internet. FileZilla is
popular FTP application which is used to
upload web pages so that they can be
hosted and viewed on the internet.

Internet Service
Provider (ISP) ISP is a company which provides internet
access to users. Normally the users would
have to pay a monthly fee. Broadband
connections tend to use fire-optic cables
for increased bandwidth.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Effective use of the internet

Cloud: Online storage medium used to backup files. Files can


Chapter 10: 10. Communication

be accessed from any device with an internet connection.


Data is saved on more than one server so in case of
maintenance or repair data is always accessible.

Advantages Disadvantages

• Files can be accessed from • Files could be hacked.


any location using an • Dependant on a good
internet connection. quality internet connection
• Users don’t have to carry to download and upload
storage devices around files.
with them. • Potential costs of using
• Offer backup solutions. cloud storage.
• Unlimited storage capacity.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Effective use of the internet

Search Engines
Chapter 10: 10. Communication

When using the internet you can either


type in a URL address or use a search
engine to find specific data. Normally key
words would be typed into a search
engine to find particular information.

The more detailed the search will result is


then the matches are likely to be more
accurate.

Advanced Search Criteria:


In many search engines you have the
option to have an advanced search.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Effective use of the internet

Blogs and Blogging • A blog is based on personal experiences and usually updated
Chapter 10: 10. Communication

by one author.
• Blog entries are in order (most recent entries are shown first).
• Blogs can not be changed by other users of the internet.
• Bloggers can be prosecuted for posting offensive material.

Wikis • A wiki is a collaboration from users (many authors) to create


content.
• Wikis can be edited by anyone (content can be edited or
deleted).
• Wikipedia is an example use of Wikis.

Social Networks • Social Networking sites allow users to interact and


communicate with each other.
• You can connect with people with similar interests.
• Users are able to share content such as photos, video and
status updates.

WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Effective use of the internet

Using the Internet


Chapter 10: 10. Communication

Advantages Disadvantages
• Regularly updated in real time. • Not regulated
• Vast amount of information. • Online threats (hacking/viruses/scams/
• Can find information using search engines. cyber bullying)
• Is available on many platforms. • Easily become distracted
• Web content can include text, images, • Sharing of illegal content
video, sounds, animations etc. • Exposure to inappropriate material
• Information may not be reliable

Why the internet is so popular? The internet has also evolved over the years with the
introduction of social networks, media streaming sites,
online shopping/banking.

• The internet is very accessible over various


platforms.
• Relatively cheap to use and sometimes free.
• Increase in bandwidth allows faster browsing and
download speeds.
WWW.YAHMAD.CO.UK
ICT IGCSE Theory – Revision Presentation
10. Communication

Effective use of the internet

Why an internet search to • Due to amount of information available on the internet


it is difficult to find specific information quickly.
Chapter 10: 10. Communication

find relevant information is


• Search engines will not necessarily post the website in
not always fast.
order of usefulness so you may have to look through
different websites to find your information.

• Content on the internet is not regulated. Any body can


make a website and post any content which is not
Why it is not always easy to factually correct.
find reliable information on • Wikis can be edited to contain false information.
the internet • Information may be biased depending on who was the
author.

How to evaluate the • Checking the websites URL address (ending in .gov or
reliability of information .ac more likely to be reliable)
found on the internet • Check links or endorsements from other websites.
• Check the last time the website was updated.

WWW.YAHMAD.CO.UK

You might also like