Professional Documents
Culture Documents
Ict Revision Notes
Ict Revision Notes
Ict Revision Notes
Hardware
Internal Components
Central Processing Unit (CPU): the computer's "brain" that performs calculations, processes
instructions, and controls other components
Processor: a chip inside the CPU that carries out instructions from a program
Motherboard: the main circuit board that connects all internal components
Internal Memory
Random Access Memory (RAM): temporary storage for running programs and data; it is
volatile, meaning data is lost when the computer is turned off
Read-Only Memory (ROM): permanent storage for essential data, like the computer's BIOS;
it is non-volatile, meaning data is retained even when the computer is turned off
Hardware Components
Graphics card: processes images and videos for display on a monitor
Sound card: processes audio for output through speakers or headphones
Network Interface Card (NIC): enables connection to a network, such as the internet
Camera: captures images or video for input into the computer
Internal/external storage devices: stores data permanently, such as hard drives or USB flash
drives
Input devices: allow users to enter data, like keyboards and mice
Output devices: display or produce results, like monitors and printers
Software
Software refers to programs that control the operation of a computer or the processing of
electronic data
Application Software
Application software provides the services that users require to solve a task E.g.:
Word processing: creating and editing text documents
Spreadsheet: organising and analysing data in a grid format
Database management systems: storing, retrieving and managing data in databases
Control/measurement: uses sensors to measure and control a system
Applets and apps: specialised software for specific tasks
Video editing: creating and modifying video files
Graphics editing: creating and modifying images
Audio editing: creating and modifying sound files
Computer Aided Design (CAD): designing and modelling objects in 2D or 3D
System Software
System software provides the services that the computer requires to operate e.g.
Compilers: translating high-level programming languages into machine code
Linkers: combining object files into a single executable program
Device drivers: controlling hardware components and peripherals
Operating systems: managing the computer's resources and providing a user interface
Utilities: tools for maintaining and optimising the computer's performance
2
Wireless Network Interface Cards (WNIC) are the same as a NIC but use wireless
connectivity to connect devices to networks
A MAC address is a 48 bit hexadecimal code where 12 hexadecimal characters are grouped
in pairs
The general format for a MAC address is that each pair of hexadecimal digits are separated
by a “-”
An example of a MAC address: Microsoft has an OUI of 00-15-5D,
a new laptop straight out of a Microsoft production line could have a MACHubs
Hubs are devices that allow several other devices to be connected to them
Switches
Switches are also used to connect several devices together just like a hub; however, rather
than sending data packets to all devices on the network, the switch will only send the data
to its intended device
1 DF-42-B2-11-4D-E3
2 11-14-F2-1D-C3-C6
3 00-4B-17-7C-A2-C9
When a switch receives a data packet, it examines the destination MAC address of the box
and looks up that address in its lookup table
Once it has found the matching MAC address it will then forward the data packet to the
corresponding port
Worked example
Explain the difference between a switch and a hub regarding data forwarding capabilities. [2]
A switch forwards data packets based on the destination MAC address and only sends data to the
intended device [1]
A hub broadcasts incoming data packets to all connected devices [1]
Bridges
Bridges are used to connect two networks or network segments to create a single larger
network
An important note is that a bridge cannot communicate with external networks such as the
internet like a router can
o Connecting to a car system allows for music streaming and hands-free calling
o When low power communication is required
Wi-Fi is also a wireless communication technology that allows devices to be connected up to
a range of about 100 meters depending on the standard that is being used
Wi-Fi operates across the 2.4Ghz and 5Ghz frequency ranges and although 5Ghz is
faster, the 2.4 GHz range is preferred as the lower frequencies often travel further and
penetrate obstacles more easily
Similar to Bluetooth bands are split into channels
Wi-Fi-enabled devices connect to a network by connecting to a hotspot or wireless access
point (WAP) also referred to as an access point (AP)
Wi-Fi may be preferred over Bluetooth when:
Bluetooth Wi-Fi
Cloud Computing
Scalability
o As the business requirements change the customer can scale services up or down to
meet their needs
Cost saving
o Cloud storage eliminates the need for a business to purchase expensive equipment
for infrastructure and maintenance which can result in significant cost savings
Accessibility
o Cloud services are available globally and allow both remote working and data sharing
Reliability
o Cloud computing providers offer high levels of uptime ensuring that services are always
available for its users
Storage Space
o Cloud services can offer an almost unlimited amount of storage
Backup and recovery
o If a customers machine or storage device fails, a backup of the data from the cloud will allow for
recovery
File Synchronisation
o Files can be synced across multiple devices
Convenience
o A user does not need to carry storage devices around with them as all data is stored on the
cloud
Internet Connection
o A stable internet connection is required to use cloud storage
Security
o Storing data in the cloud may be vulnerable to security breaches
Dependency
o The user is dependent on the storage provider for the availability and reliability of its services
6
Ceases to trade/dissolve
o Should the company dissolve or cease to change, all cloud data may be lost
Cost
As the amount of storage or bandwidth required increases, the service may become
expensive over time
Worked example
Internet
Exam Tipu must be very clear about the difference between the World Wide Web and the Interne
Characteristics of the Internet
Open The Internet is an open network meaning anyone with access can access the same
resources and information as everybody else
Decentralisation The Internet is a decentralised network with no owner, controller or
governing body. Instead, it is made up of vast numbers of interconnecting networks that
operate independently but work together to provide communication
Global Reach The internet is a global network meaning that people from all over the world
can communicate with each other in real-time
Accessibility The Internet is available to anyone who has a suitable device and access to
any one of the interconnected networks
The Internet has many uses and plays a critical role in our lives. This can include;
Education and training
Social Networking
Online shopping
Entertainment
7
Intranet
Characteristics of an Intranet
Private
o An intranet is a private network that is accessible to employees within a company or
organisation
Security
o An intranet is usually behind a firewall to ensure security and that only authorised
users can access it
Sharing and Communication
o An Intranet allows for document sharing and the use of collaboration tools between
users. It can also allow the use of email and video calling to enable efficient
communication within the organisation
Customisation
o An intranet can be customised to meet the specific requirements of the business
such as navigation and subject content as well as the service being able to be scaled
up as the business grows
Users will require a username and password to access the Intranet
Extranet
An extranet is a private Intranet that also allows access by selected parties that reside
outside of the organisation. These parties, for example, maybe customers, key stakeholders
or clients
External users will have an authorisation level once they have successfully logged in which
will determine which resources they may access
8
Worked example
Local Area Networks (LANs) are networks that are usually contained within a single building
or small geographical location
A LAN is made up using hubs and/or switches which will connect several devices together
It is common for one hub or switch to be connected to a router which will allow
the LAN connectivity to other outside networks such as the internet
WAN
Wireless LANs (WLANs) are Local Area Networks that allow devices to connect wirelessly
rather than using physical cables
Wireless Access Points (WAPs) are connected to an existing wired network which provides a
means to connect wirelessly
Wireless Access Points use spread spectrum technology that has a range of around 30 to 50
metres compared to Infrared which has a range of around 3 metres
WLANs are often used when it is not practical to use cable or devices that will access the
network do not have Ethernet ports
WLANs support a vast range of devices such as smartphones and laptops and are very
popular in public areas such as shopping malls
Worked example
Give 2 reasons why a fitness centre may want to install a WLAN [4]
The fitness centre may wish to install a WLAN for several reasons such as :
Customers can connect to their Wi-Fi and search for information such as class times etc [1]
will improve customer services [1]
Staff at the fitness centre will be able to access resources wirelessly such as printers [1]
allowing them to move freely around the centre [1]
Security Issues
When moving electronic data from one place to another, there are different types of security
concerns to consider:
o Data interception can occur when an unauthorised user intercepts data being
transferred.
Two common methods are
Packet sniffing
When dealing with personal or sensitive data it is essential that not only is it protected from
hackers but also that it is protected from accidental disclosures such as:
o Sending an email with sensitive information to the wrong person
o Losing a device that has sensitive data stored
o Shared access misconfigurations allow unauthorised users access to sensitive data
Passwords
Passwords are a common form of security and are often accompanied by a username or
email address
This type of security is often seen when accessing online banking, virtual learning
environments, email accounts and many more
There are many ways to enhance the security of your password such as the following:
o Ensure that the password is changed regularly in case it has been obtained illegally
or accidentally
o Ensure that the password uses a combination of uppercase, lowercase, numbers and
symbols to make the password more difficult to guess
o iloveict is a weak password
o 1lov3ICT# is a strong password
Passwords should not contain personal information related to you such as your date of birth,
your name or the name of your pet
Anti spyware software can be run regularly to ensure that your information including your
password is not being passed to an unauthorised third party user
Authentication
There are also other forms of authentication aside from passwords that utilise what is
known as “zero login”
This aims at removing or reducing the need for the user to manually input their details and
instead rely on the system to verify the users credentials automatically
One such type is known as biometrics where the user's fingerprints or facial features are
scanned to provide unique biometric information to authenticate the user's details.
Newer methods of zero login types of authentication include the use of networks, location,
device data and human behavioural patterns to recognise users automatically.
Although these methods offer many advantages there are some concerns that need to be
taken into consideration. They include:
o What personal data is being collected?
o Is the collected data being kept securely?
o Will it log in and out at the correct times?
11
Magnetic stripe cards are a form of card that stores the user’s data on a magnetic strip
usually on the reverse side
The user scans the card through a reader where the details stored on the card are compared
to the details stored within the system. It the data from the card matches the data that is
store on the system the user is authenticated and granted access
The advantages to use magnetic stripe cards include:
o Widely used and accepted
o Cheap
o Simple to use
o A single card can serve multiple purposes within an organisation such as doors,
purchasing food from canteens and accessing IT equipment
Smart Cards
Smart Cards are cards that contain a chip and can be used as contactless
The card does not need to be inserted or swiped through a machine and can be detected
from a short distance away
Personal identification information can be stored on the card such as name, address, date of
birth and/or banking information
The information on the card is encrypted which means it can only be read by authorised
devices
Often the card will require a personal identification number (PIN) which is needed to access
the information, providing an additional layer of security
Advantages of smart cards include:
o Durable
o Use for a wide range of applications (Payments, Access Control, Storing personal
data
o Enhanced security (Compared to standard cards)
Disadvantages of smart cards include:
o Risk of loss
o Initial Infrastructure requirements
o More expensive compared to traditional cards
Physical Tokens
A Physical Token enables authentication with the use of a small physical device
To access a system that uses a physical token, a user will enter their username and
password into the system, and then enter the security code generated by the token
The physical token can be directly connected to the device that the user is trying to access
or the physical token will generate one time password (OTP) which is then entered into the
system manually
To obtain a one time password (OTP) the user will enter their personal identification
number (PIN) and any other authentication requirements into the physical token device. If
12
all requirements are satisfied then an internal clock will be used to generate the one time
password (OTP) which is displayed on its screen
To enhance security, the one time password (OTP) changes frequently and each code will
only be valid for a short period of time (usually within 1 minute)
Advantages of physical tokens include:
o Offline authentication
o Portable
o When using a connected physical token, the one time password (OTP) is generated
and passed to the system automatically though a physical connection and does not
require to user to enter the password manually
Electronic tokens
Electronic Tokens are a form of application software that is installed on a user's device
(usually smartphone) to allow them to authenticate their details and allow them to access a
secure website
A user must download and register the electronic token software app prior to accessing the
secure website
As the website prompts for authentication, the user will open the app that will provide
a one time passcode (OTP) which will be entered into an entry box on the website along
with other forms of authentication such as a username and personal identification number
(PIN)
Both the web server and the smartphone application have synchronised clocks which will
generate identical numbers and should the authentication details match, the user will be
granted access to the website
The above explanation is just one method of authentication when using electronic
tokens. Another method is as follows:
o The website will prompt the user for their username and password
o Upon successful credentials the website will generate a code
o The code is then entered into the application software on the users phone which will
generate another code
o The generated code from the application software is then entered into an entry box
on the website
o Should all authentication methods pass successfully, the user is granted access to
the website
13
Anti-malware
Anti-Malware (also known as Anti Virus software) is designed to protect devices against
viruses and malicious software
Anti-malware has 3 mains purposes, detect, prevent and remove malicious software
Anti-Malware is installed onto a computer system and will operate in the background
o Heuristic checking
This is the identification of potential threats within a file from behavioural
patterns and characteristics rather than just relying on a database of known
viruses
Worked example
Give two examples of how Anti-Malware protects devices against malicious software [4]
Regular updates by the Anti-Malware software will keep an up to date list of threats [1]
If any of the threats are detected on the device, the Anti-Malware software will quarantine the
files [1]
Anti-Malware software will scan external storage media when they are connected to the device [1]
Preventing viruses from being transferred from storage media onto the device [1]
A microprocessor is a small computer chip that can be used to control devices. It is made up of a
central processing unit (CPU), memory, and input/output (I/O) devices. The CPU is responsible for
carrying out instructions, the memory stores data, and the I/O devices allow the microprocessor to
communicate with the outside world.
Positive effects on lifestyle, leisure, physical fitness, and data security include:
o Convenience
Devices such as smart thermostats, lights, and appliances can be controlled
remotely, saving time and effort
People have more time to spend on the things they want
Smart fridges automatically order fresh food and therefore reduce food
waste
o Fitness tracking
Devices like smart watches monitor physical activity and health data,
encouraging healthier lifestyles
o Security
Smart security systems provide real-time surveillance, adding an extra layer
of protection to homes
Negative effects include:
o Privacy risks
These devices can be vulnerable to hacking, risking the security of personal
data
o Social interaction
Over-reliance on these devices can decrease face-to-face interaction,
impacting social skills
o Physical fitness
Despite fitness tracking, sedentary behaviour may increase due to the
convenience of smart devices
Worked example
Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles. One
of the positive effects of using these devices is that we can now set a cooker to switch on whilst we
are out so that we arrive home to a cooked meal. Describe the positive effects of using other
microprocessor-controlled devices in the home.
Microprocessor-controlled devices reduce the need for people to do manual tasks at home [1]
People can use microprocessor-controlled devices for physical fitness tracking in the home [1]
People have more time to spend on leisure activities/shopping/socialising [1]
Increased sense of security as homes are protected with burglar alarms/ smoke alarms/fire
alarms [1]
Smart fridges can be used to improve healthy lifestyle//Smart fridges automatically order fresh
food//Smart fridges reduce food waste [1]
Microprocessor-controlled devices can be set remotely using a smartphone [1]
Saves fuel as the heating/air conditioning is not on all day [1]
Reduces injuries by using microprocessor-controlled lights outside [1]
Communication Media
Communication media is the various methods and channels used to convey information and
messages between people, organisations, and devices.
Communication Media
Communication media is the various methods and channels used to convey
information and messages between people, organisations, and devices.