Ict Revision Notes

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

1

Hardware

 Hardware refers to the physical components of a computer system


 These components can be internal or external

Internal Components
 Central Processing Unit (CPU): the computer's "brain" that performs calculations, processes
instructions, and controls other components
 Processor: a chip inside the CPU that carries out instructions from a program
 Motherboard: the main circuit board that connects all internal components

Internal Memory
 Random Access Memory (RAM): temporary storage for running programs and data; it is
volatile, meaning data is lost when the computer is turned off
 Read-Only Memory (ROM): permanent storage for essential data, like the computer's BIOS;
it is non-volatile, meaning data is retained even when the computer is turned off

Hardware Components
 Graphics card: processes images and videos for display on a monitor
 Sound card: processes audio for output through speakers or headphones
 Network Interface Card (NIC): enables connection to a network, such as the internet
 Camera: captures images or video for input into the computer
 Internal/external storage devices: stores data permanently, such as hard drives or USB flash
drives
 Input devices: allow users to enter data, like keyboards and mice
 Output devices: display or produce results, like monitors and printers

Software

 Software refers to programs that control the operation of a computer or the processing of
electronic data

Application Software

Application software provides the services that users require to solve a task E.g.:
 Word processing: creating and editing text documents
 Spreadsheet: organising and analysing data in a grid format
 Database management systems: storing, retrieving and managing data in databases
 Control/measurement: uses sensors to measure and control a system
 Applets and apps: specialised software for specific tasks
 Video editing: creating and modifying video files
 Graphics editing: creating and modifying images
 Audio editing: creating and modifying sound files
 Computer Aided Design (CAD): designing and modelling objects in 2D or 3D

System Software
 System software provides the services that the computer requires to operate e.g.
 Compilers: translating high-level programming languages into machine code
 Linkers: combining object files into a single executable program
 Device drivers: controlling hardware components and peripherals
 Operating systems: managing the computer's resources and providing a user interface
 Utilities: tools for maintaining and optimising the computer's performance
2

Common Network Devices


Network Interface Cards (NICs)

 Network Interface Cards (NIC) allow an electronic device to be connected to a network


 Network Interface Cards are connected to the motherboard but in most modern
systems are usually integrated
 Each network interface card has a unique identifier which is known as a media access
control address or MAC address which is created during the manufacturing process

 Wireless Network Interface Cards (WNIC) are the same as a NIC but use wireless
connectivity to connect devices to networks

 A MAC address is a 48 bit hexadecimal code where 12 hexadecimal characters are grouped
in pairs

 The general format for a MAC address is that each pair of hexadecimal digits are separated
by a “-”
 An example of a MAC address: Microsoft has an OUI of 00-15-5D,

a new laptop straight out of a Microsoft production line could have a MACHubs

 Hubs are devices that allow several other devices to be connected to them

 Hubs are generally much cheaper than switches but:


o When a hub receives a data packet it will broadcast it to every device on the network
 This creates two potential issues:
o As the information is being broadcast to every device it will make unnecessary traffic
especially if there are a large number of devices
o As every device will receive the data packet, security may be a concern

Switches
 Switches are also used to connect several devices together just like a hub; however, rather
than sending data packets to all devices on the network, the switch will only send the data
to its intended device

 This is done by each switch having a lookup table


3

Port Mac address

1 DF-42-B2-11-4D-E3
2 11-14-F2-1D-C3-C6
3 00-4B-17-7C-A2-C9

 When a switch receives a data packet, it examines the destination MAC address of the box
and looks up that address in its lookup table
 Once it has found the matching MAC address it will then forward the data packet to the
corresponding port

Worked example

Explain the difference between a switch and a hub regarding data forwarding capabilities. [2]
A switch forwards data packets based on the destination MAC address and only sends data to the
intended device [1]
A hub broadcasts incoming data packets to all connected devices [1]
Bridges

 Bridges are used to connect two networks or network segments to create a single larger
network
 An important note is that a bridge cannot communicate with external networks such as the
internet like a router can

Wi-Fi & Bluetooth

 Bluetooth is a wireless communication technology that allows devices to be connected


within a maximum range of about 30 meters
 Before communication can happen, two devices connect using a process called “pairing” to
establish a secure connection
 When two devices pair, they both exchange a cryptographic key. Both these keys are used
to generate a secret shared key which is used to encrypt the data between the two devices
and create a Wireless Personal Area Network (WPAN)
 Bluetooth operates using a frequency range of around 2.4Ghz
 Connected devices continuously change their transmitting frequency between 79 different
channels to avoid interference and improve the reliability of the connection. This is known
as the frequency hopping spread spectrum (FHSS)
 Bluetooth may be preferred over Wi-Fi when:
o File transfer required between two close-range devices such as a laptop and
smartphone without the need for internet connectivity
o Streaming audio from a smartphone to another wireless device such as a speaker or
headphones
4

o Connecting to a car system allows for music streaming and hands-free calling
o When low power communication is required
 Wi-Fi is also a wireless communication technology that allows devices to be connected up to
a range of about 100 meters depending on the standard that is being used
 Wi-Fi operates across the 2.4Ghz and 5Ghz frequency ranges and although 5Ghz is
faster, the 2.4 GHz range is preferred as the lower frequencies often travel further and
penetrate obstacles more easily
 Similar to Bluetooth bands are split into channels
 Wi-Fi-enabled devices connect to a network by connecting to a hotspot or wireless access
point (WAP) also referred to as an access point (AP)
 Wi-Fi may be preferred over Bluetooth when:

 High speed data transfer is required


 Long range communication is required
 Many devices are needed to be connected at the same time

Similarities between Bluetooth and Wi-FI


 Use radio waves for wireless technologies
 Can connect multiple devices
 Support encryption for secure connections
 Based on industry standards that are universally accepted
 It can be used to connect Internet of Things (IoT) devices and applications
 Differences between Bluetooth and -Wi-Fi

Bluetooth Wi-Fi

Maximum number of 30 (based on a standard consumer grade router with high


7
connections end options providing substantially more)
Transmission frequency 2.4Ghz 2.4Ghz, 5Ghz
Maximum range (meters) 30 meters 100 meters (depending on obstructions)
Maximum transfer speed
3 Mbytes /
75 Mbytes / Sec
(Depending on the standard Sec
being used)
 Worked example
 A school IT team is trying to determine what technology they should use to connect
students' tablets around the school for data transfer and are unsure whether to choose Wi-
Fi or Bluetooth technology. Consider the advantages and limitations of both and justify your
answer
 WiFi offers significantly faster transfer rates compared to Bluetooth [1]
 so students will be able to upload and download files faster [1]
 WiFi coverage can be over a much larger area compared to Bluetooth [1]
 so that students will be able to access resources wherever they are in the school [1]
 Bluetooth however, is easy to set up [1]
 students can transfer data without the school having to invest in expensive infrastructure [1]
 Given the current situation, the school is in, the preferred choice for connecting student's tablets
would be Wi-Fi [1]
5

Cloud Computing

 Cloud computing is a method where data is stored


on remote servers and accessed through the internet
 Local storage refers to a storage device that is
connected to the computer

The three types of cloud storage are:


o Public Cloud - The customer and the cloud storage provider are different companies
o Private Cloud - The customer and the cloud storage provider are a single organisation
 Hybrid Cloud - Combines both public and private cloud options and allows for sensitive data
to remain private whilst providing public cloud services for less sensitive information
 Cloud data is duplicated and stored on other servers to ensure data availability during
system failures, upgrades and maintenance periods

Advantages of Cloud storage

 Scalability
o As the business requirements change the customer can scale services up or down to
meet their needs
 Cost saving
o Cloud storage eliminates the need for a business to purchase expensive equipment
for infrastructure and maintenance which can result in significant cost savings
 Accessibility
o Cloud services are available globally and allow both remote working and data sharing
 Reliability
o Cloud computing providers offer high levels of uptime ensuring that services are always
available for its users
 Storage Space
o Cloud services can offer an almost unlimited amount of storage
 Backup and recovery
o If a customers machine or storage device fails, a backup of the data from the cloud will allow for
recovery
 File Synchronisation
o Files can be synced across multiple devices
 Convenience
o A user does not need to carry storage devices around with them as all data is stored on the
cloud

Disadvantages of Cloud Storage

 Internet Connection
o A stable internet connection is required to use cloud storage
 Security
o Storing data in the cloud may be vulnerable to security breaches
 Dependency
o The user is dependent on the storage provider for the availability and reliability of its services
6

 Ceases to trade/dissolve
o Should the company dissolve or cease to change, all cloud data may be lost
 Cost
 As the amount of storage or bandwidth required increases, the service may become
expensive over time

Worked example

Explain the difference between cloud storage and local storage[2]


Cloud storage involves storing data on remote servers accessed via the internet [1]
While local storage refers to storing data on physical devices like hard drives or flash drives [1]

Internet

 The Internet is a very large global network


that consists of many
other interconnected networks
 The world wide web is the vast collection of
web pages that can be accessed using a web
browser
 The world wide web allows you to access
information by using the internet

Exam Tipu must be very clear about the difference between the World Wide Web and the Interne
Characteristics of the Internet
 Open The Internet is an open network meaning anyone with access can access the same
resources and information as everybody else
 Decentralisation The Internet is a decentralised network with no owner, controller or
governing body. Instead, it is made up of vast numbers of interconnecting networks that
operate independently but work together to provide communication
 Global Reach The internet is a global network meaning that people from all over the world
can communicate with each other in real-time
 Accessibility The Internet is available to anyone who has a suitable device and access to
any one of the interconnected networks

The Internet has many uses and plays a critical role in our lives. This can include;
 Education and training
 Social Networking
 Online shopping
 Entertainment
7

Intranet

 Intranets operate in a similar way to the Internet and


although they are still networks, they are usually private and
are used to send information securely and safely
 Unlike the Internet which is a global network accessible by
all, access to an organisation’s Intranet is restricted and only
accessible to authorised users such as employees

 Intranets have many advantages over the internet such as:


o Better bandwidth than the internet
o Data is kept within the organisation
o Less chance of hacking and attacks
o Administrators can manage access to external sites and links

Characteristics of an Intranet

 Private
o An intranet is a private network that is accessible to employees within a company or
organisation
 Security
o An intranet is usually behind a firewall to ensure security and that only authorised
users can access it
 Sharing and Communication
o An Intranet allows for document sharing and the use of collaboration tools between
users. It can also allow the use of email and video calling to enable efficient
communication within the organisation
 Customisation
o An intranet can be customised to meet the specific requirements of the business
such as navigation and subject content as well as the service being able to be scaled
up as the business grows
 Users will require a username and password to access the Intranet

Extranet

 An extranet is a private Intranet that also allows access by selected parties that reside
outside of the organisation. These parties, for example, maybe customers, key stakeholders
or clients
 External users will have an authorisation level once they have successfully logged in which
will determine which resources they may access
8

 Similarities between the Internet, Intranet and extranet are as follows:

 They are all web based technologies


 They allow users to access information remotely
 They all use client server architecture
 They all use security measures such as authentication and encryption
 They all promote and facilitate information and resource sharing

 Differences between the internet, intranet and extranet are as follows:

 The internet is a global network whereas an intranet/extranet is a private network


contained within an organisation
 The use of the internet covers a wide range of purposes whereas an intranet/extranet is
designed for specific users and purposes
 Much of the information is publicly available whereas an intranet/extranet is not
 The internet is not owned solely by one person or organisation whereas intranets/extranets
are owned usually by the organisation

 Worked example

A company uses an Intranet. Explain what is meant by an Intranet [2]


An Intranet is a private network that is accessible to employees of the organisation and not to
members of the public [1]
It provides employees access to company information and to share resources internally [1]
LAN

 Local Area Networks (LANs) are networks that are usually contained within a single building
or small geographical location
 A LAN is made up using hubs and/or switches which will connect several devices together
 It is common for one hub or switch to be connected to a router which will allow
the LAN connectivity to other outside networks such as the internet

 A LAN can offer many advantages such as:


o Centralised management - A LAN allows centralised management of updates,
backups and software installations.
o Security - A LAN can secure its devices with the use of firewalls, antivirus software
and other security features to prevent unauthorised access
o File Sharing and Collaboration - A LAN allows users on the network to share
resources such as printers and other peripherals. This also allows the users of the
network to collaborate and share files and folders

 Disadvantages of a LAN include:


o If hardware fails, the network may not function properly or even at all
o Networks are more prone to attacks than standalone computers
o Access to data and peripherals can be slow depending on network traffic
o Maintenance - LAN networks require maintenance to ensure that software is up to
date, upgrades and backups which can be costly
9

WAN

 Wireless LANs (WLANs) are Local Area Networks that allow devices to connect wirelessly
rather than using physical cables
 Wireless Access Points (WAPs) are connected to an existing wired network which provides a
means to connect wirelessly
 Wireless Access Points use spread spectrum technology that has a range of around 30 to 50
metres compared to Infrared which has a range of around 3 metres
 WLANs are often used when it is not practical to use cable or devices that will access the
network do not have Ethernet ports
 WLANs support a vast range of devices such as smartphones and laptops and are very
popular in public areas such as shopping malls

 Advantages of a WLAN include:


o Mobility - WLAN allows users to connect anywhere that is in the range of a Wireless
Access Point (WAP) without the need for additional hardware or wiring.
o Flexibility - WLANS can be used in a variety of environments both indoors and out
making them highly flexible
o Scalability - As the requirements change, additional Wireless Access Points can be
added relatively easily resulting in additional users being able to use the network or
increased network coverage
o Wireless devices have access to peripherals such as printers

 Disadvantages of a WLAN include:


o Coverage - WLANS are limited in their coverage and can be further affected by walls
and other structures
o Bandwidth - Bandwidth speeds can become an issue in high traffic areas
o Interference - WLANs can sustain interference from other devices which can affect
performance and connectivity
o Security - WLANs can be vulnerable to security threats due to wireless signals being
intercepted

Worked example
Give 2 reasons why a fitness centre may want to install a WLAN [4]
The fitness centre may wish to install a WLAN for several reasons such as :
Customers can connect to their Wi-Fi and search for information such as class times etc [1]
will improve customer services [1]
Staff at the fitness centre will be able to access resources wirelessly such as printers [1]
allowing them to move freely around the centre [1]

Security Issues

 When moving electronic data from one place to another, there are different types of security
concerns to consider:
o Data interception can occur when an unauthorised user intercepts data being
transferred.
 Two common methods are

 Packet sniffing

 Man in the middle attack


10

 Encryption can be broken if it is not strong


 Using HTTP instead of HTTPS protocols when dealing with sensitive information
 Depending on whether the data being sent is sensitive will depend on the level of security
needed to ensure it stays safe
 All types of information will need to be transferred from one place to another at some point but
typical examples may include:
o User credentials when logging into online banking
o Medical records being passed from a hospital to a GP
o Student details from one school to another
o Criminal records and details

 When dealing with personal or sensitive data it is essential that not only is it protected from
hackers but also that it is protected from accidental disclosures such as:
o Sending an email with sensitive information to the wrong person
o Losing a device that has sensitive data stored
o Shared access misconfigurations allow unauthorised users access to sensitive data

Passwords
 Passwords are a common form of security and are often accompanied by a username or
email address
 This type of security is often seen when accessing online banking, virtual learning
environments, email accounts and many more
 There are many ways to enhance the security of your password such as the following:
o Ensure that the password is changed regularly in case it has been obtained illegally
or accidentally
o Ensure that the password uses a combination of uppercase, lowercase, numbers and
symbols to make the password more difficult to guess
o iloveict is a weak password
o 1lov3ICT# is a strong password
 Passwords should not contain personal information related to you such as your date of birth,
your name or the name of your pet
 Anti spyware software can be run regularly to ensure that your information including your
password is not being passed to an unauthorised third party user

Authentication

 There are also other forms of authentication aside from passwords that utilise what is
known as “zero login”
 This aims at removing or reducing the need for the user to manually input their details and
instead rely on the system to verify the users credentials automatically
 One such type is known as biometrics where the user's fingerprints or facial features are
scanned to provide unique biometric information to authenticate the user's details.
 Newer methods of zero login types of authentication include the use of networks, location,
device data and human behavioural patterns to recognise users automatically.
 Although these methods offer many advantages there are some concerns that need to be
taken into consideration. They include:
o What personal data is being collected?
o Is the collected data being kept securely?
o Will it log in and out at the correct times?
11

Magnetic Stripe Cards

 Magnetic stripe cards are a form of card that stores the user’s data on a magnetic strip
usually on the reverse side
 The user scans the card through a reader where the details stored on the card are compared
to the details stored within the system. It the data from the card matches the data that is
store on the system the user is authenticated and granted access
 The advantages to use magnetic stripe cards include:
o Widely used and accepted
o Cheap
o Simple to use
o A single card can serve multiple purposes within an organisation such as doors,
purchasing food from canteens and accessing IT equipment

 Disadvantages to magnetic stripe cards include:


o Some cards use a holographic or photographic ID to detect forged or stolen copies
o The card can may need to be scanned multiple times before the user is accepted
and authenticated
o Cards can become damaged or wear out over time (especially with constant use)
o Cards can be easily cloned

Smart Cards

 Smart Cards are cards that contain a chip and can be used as contactless
 The card does not need to be inserted or swiped through a machine and can be detected
from a short distance away
 Personal identification information can be stored on the card such as name, address, date of
birth and/or banking information
 The information on the card is encrypted which means it can only be read by authorised
devices
 Often the card will require a personal identification number (PIN) which is needed to access
the information, providing an additional layer of security
 Advantages of smart cards include:
o Durable
o Use for a wide range of applications (Payments, Access Control, Storing personal
data
o Enhanced security (Compared to standard cards)
 Disadvantages of smart cards include:
o Risk of loss
o Initial Infrastructure requirements
o More expensive compared to traditional cards

Physical Tokens

 A Physical Token enables authentication with the use of a small physical device
 To access a system that uses a physical token, a user will enter their username and
password into the system, and then enter the security code generated by the token
 The physical token can be directly connected to the device that the user is trying to access
or the physical token will generate one time password (OTP) which is then entered into the
system manually
 To obtain a one time password (OTP) the user will enter their personal identification
number (PIN) and any other authentication requirements into the physical token device. If
12

all requirements are satisfied then an internal clock will be used to generate the one time
password (OTP) which is displayed on its screen
 To enhance security, the one time password (OTP) changes frequently and each code will
only be valid for a short period of time (usually within 1 minute)
 Advantages of physical tokens include:
o Offline authentication
o Portable

 Disadvantages of physical tokens include:


o Cost
o Loss or theft of the physical token
o Physical dependance

There are two typical of physical token:

 Disconnected physical token

o When using a disconnected physical token, a separate device is used to generate


the one time password (OTP) which the user will then enter into the system
manually

 Connected physical token

o When using a connected physical token, the one time password (OTP) is generated
and passed to the system automatically though a physical connection and does not
require to user to enter the password manually

Electronic tokens

 Electronic Tokens are a form of application software that is installed on a user's device
(usually smartphone) to allow them to authenticate their details and allow them to access a
secure website
 A user must download and register the electronic token software app prior to accessing the
secure website
 As the website prompts for authentication, the user will open the app that will provide
a one time passcode (OTP) which will be entered into an entry box on the website along
with other forms of authentication such as a username and personal identification number
(PIN)
 Both the web server and the smartphone application have synchronised clocks which will
generate identical numbers and should the authentication details match, the user will be
granted access to the website
 The above explanation is just one method of authentication when using electronic
tokens. Another method is as follows:
o The website will prompt the user for their username and password
o Upon successful credentials the website will generate a code
o The code is then entered into the application software on the users phone which will
generate another code
o The generated code from the application software is then entered into an entry box
on the website
o Should all authentication methods pass successfully, the user is granted access to
the website
13

Anti-malware

 Anti-Malware (also known as Anti Virus software) is designed to protect devices against
viruses and malicious software

 Anti-malware has 3 mains purposes, detect, prevent and remove malicious software

 Anti-Malware is installed onto a computer system and will operate in the background

 Common features of Anti-Malware software include the following:


o Comparing the scanned files against a large database of known threats
o Real-time scanning
o Regular updates to gather an up to date list of known threats
o Quarantine of infected files
 Quarantining files allows threats to be automatically deleted
 Allows the user to determine if the file is a legitimate threat and not a false
positive
o Scanning external storage media such as USB flash drives to prevent viruses from
being loaded onto the computer system
 The scanning of downloaded software to ensure that it is free from any
threats


o Heuristic checking
 This is the identification of potential threats within a file from behavioural
patterns and characteristics rather than just relying on a database of known
viruses

Worked example
Give two examples of how Anti-Malware protects devices against malicious software [4]
Regular updates by the Anti-Malware software will keep an up to date list of threats [1]
If any of the threats are detected on the device, the Anti-Malware software will quarantine the
files [1]
Anti-Malware software will scan external storage media when they are connected to the device [1]
Preventing viruses from being transferred from storage media onto the device [1]

Microprocessor Controlled Devices

A microprocessor is a small computer chip that can be used to control devices. It is made up of a
central processing unit (CPU), memory, and input/output (I/O) devices. The CPU is responsible for
carrying out instructions, the memory stores data, and the I/O devices allow the microprocessor to
communicate with the outside world.

Microprocessor controlled devices are used in a wide variety of applications, including:

 Household appliances, such as washing machines, refrigerators, and ovens


 Office equipment, such as printers, scanners, and photocopiers
 Industrial machineries, such as robots and assembly lines
 Transportation, such as cars, aeroplanes, and trains
 Medical devices, such as pacemakers and insulin pumps

Impact of Microprocessors on Home Life


14

 Positive effects on lifestyle, leisure, physical fitness, and data security include:
o Convenience
 Devices such as smart thermostats, lights, and appliances can be controlled
remotely, saving time and effort
 People have more time to spend on the things they want
 Smart fridges automatically order fresh food and therefore reduce food
waste
o Fitness tracking
 Devices like smart watches monitor physical activity and health data,
encouraging healthier lifestyles
o Security
 Smart security systems provide real-time surveillance, adding an extra layer
of protection to homes
 Negative effects include:
o Privacy risks
 These devices can be vulnerable to hacking, risking the security of personal
data
o Social interaction
 Over-reliance on these devices can decrease face-to-face interaction,
impacting social skills
o Physical fitness
 Despite fitness tracking, sedentary behaviour may increase due to the
convenience of smart devices

Impact of Microprocessors on Transport


 Positive effects on data security, autonomous vehicles, and transport safety include:
o Efficiency
 Autonomous vehicles optimise routes, reducing travel time and fuel
consumption
o Safety
 Advanced safety features, like automatic braking and lane assist, can reduce
accidents
o Data security
 Real-time tracking and encryption help protect against theft or loss
 Negative effects include:
o Privacy issues
 Data collected by these vehicles could be misused or hacked
o Job losses
 Autonomous vehicles could replace jobs in transport industries, leading to
unemployment
o Safety risks
 Malfunctions in autonomous vehicle systems could lead to accidents
15

Worked example

Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles. One
of the positive effects of using these devices is that we can now set a cooker to switch on whilst we
are out so that we arrive home to a cooked meal. Describe the positive effects of using other
microprocessor-controlled devices in the home.

Microprocessor-controlled devices reduce the need for people to do manual tasks at home [1]
People can use microprocessor-controlled devices for physical fitness tracking in the home [1]
People have more time to spend on leisure activities/shopping/socialising [1]
Increased sense of security as homes are protected with burglar alarms/ smoke alarms/fire
alarms [1]
Smart fridges can be used to improve healthy lifestyle//Smart fridges automatically order fresh
food//Smart fridges reduce food waste [1]
Microprocessor-controlled devices can be set remotely using a smartphone [1]
Saves fuel as the heating/air conditioning is not on all day [1]
Reduces injuries by using microprocessor-controlled lights outside [1]

Health Issues When Using Computers


Common health issues related to extensive ICT use include:

 Repetitive Strain Injury (RSI)


o A condition affecting muscles and nerves, often caused by repetitive movements
and overuse
 Back problems
o Poor posture while using devices can lead to back pain and other related issues
 Eye problems
o Strain and fatigue from staring at screens for long periods can harm vision
 Headaches
o Overuse of ICT devices can cause headaches, usually due to eye strain or poor
posture

Health Issue Causes Prevention Strategies

Repetitive Repeated physical movements do damage Regular


Strain Injury to tendons, nerves, muscles, and other soft breaks, ergonomic equipment, and
(RSI) body tissues. correct typing techniques.

Poor posture, particularly when using Correct posture, ergonomic


Back problems
devices for long periods. furniture, and regular movement.
Regular breaks from the screen,
Prolonged screen time leads to digital eye
appropriate screen brightness, and
Eye problems strain, characterised by dryness, irritation,
maintaining an appropriate distance
and blurred vision.
from the screen.
16

Health Issue Causes Prevention Strategies

Regular breaks, maintaining good


Factors such as poor posture, eye strain, or
Headaches posture, and ensuring proper screen
stress from overuse of devices.
brightness.

Communication Media
Communication media is the various methods and channels used to convey information and
messages between people, organisations, and devices.

 Newsletters: Periodic publications, often used to inform, educate, or entertain subscribers


about specific topics
o Usually distributed through email or as printed copies
o Suitable for organisations, schools, and clubs to keep members up-to-date
 Posters: Visual presentations that convey information or promote events or products
o Combine text, images, and graphics to grab the attention
o Used for advertising, public service announcements, and event promotion
 Websites: Online platforms that provide information or services
o Accessible through the internet using a web browser
o Useful for businesses, educational institutions, and individuals to share information,
sell products, or offer services
 Multimedia presentations: Digital presentations that combine various forms of media, such
as text, images, audio, and video
o Used in education, business, and entertainment to present information in a visually
engaging way
 Audio: Sound recordings, such as podcasts, music, and radio shows
o It can be streamed or downloaded for offline listening
o Suitable for providing information, entertainment, or educational content
 Video: Moving images with or without sound, used for entertainment, education, or
promotional purposes
o Can be streamed or downloaded for offline viewing
o Typical platforms include YouTube, Vimeo, and social media websites
 Media streaming: Real-time transmission of audio and video files over the internet
o Allows users to access content without downloading it to their devices
o Popular services include Spotify, Netflix, and YouTube
 ePublications: Digital versions of printed materials, such as eBooks, eMagazines, and
eNewspapers
o It can be read on electronic devices, such as eReaders, tablets, and smartphones
o Offer benefits like portability, searchability, and adjustable text size

Communication Media
Communication media is the various methods and channels used to convey
information and messages between people, organisations, and devices.

 Newsletters: Periodic publications, often used to inform, educate, or entertain


subscribers about specific topics
o Usually distributed through email or as printed copies
17

o Suitable for organisations, schools, and clubs to keep members up-to-date


 Posters: Visual presentations that convey information or promote events or products
o Combine text, images, and graphics to grab the attention
o Used for advertising, public service announcements, and event promotion
 Websites: Online platforms that provide information or services
o Accessible through the internet using a web browser
o Useful for businesses, educational institutions, and individuals to share
information, sell products, or offer services
 Multimedia presentations: Digital presentations that combine various forms of
media, such as text, images, audio, and video
o Used in education, business, and entertainment to present information in a
visually engaging way

 Audio: Sound recordings, such as podcasts, music, and radio shows


o It can be streamed or downloaded for offline listening
o Suitable for providing information, entertainment, or educational content
 Video: Moving images with or without sound, used for entertainment, education, or
promotional purposes
o Can be streamed or downloaded for offline viewing
o Typical platforms include YouTube, Vimeo, and social media websites
 Media streaming: Real-time transmission of audio and video files over the internet
o Allows users to access content without downloading it to their devices
o Popular services include Spotify, Netflix, and YouTube
 ePublications: Digital versions of printed materials, such as eBooks, eMagazines,
and eNewspapers
o It can be read on electronic devices, such as eReaders, tablets, and
smartphones
o Offer benefits like portability, searchability, and adjustable text size

You might also like